zsh-workers
 help / color / mirror / code / Atom feed
From: Jonathan H <pythonnut@gmail.com>
To: Peter Stephenson <p.w.stephenson@ntlworld.com>
Cc: zsh-workers@zsh.org
Subject: Re: Complex config triggering Segfault in pattern matching code.
Date: Mon, 15 Dec 2014 13:20:44 -0800	[thread overview]
Message-ID: <CAAW2-Zft+xzCfSYF4O9F5TnaYqODdr8P_ZisPTPHQK8qyeGuVw@mail.gmail.com> (raw)
In-Reply-To: <20141214182021.1944bbcd@pws-pc.ntlworld.com>

[-- Attachment #1: Type: text/plain, Size: 3029 bytes --]

It usually is, but for some reason I can't get it to crash in
valgrind. I forgot to tell you guys, but the crashes happen more often
when the user types rapidly. (Race condition related maybe).

Anyway, here's the STDERR from "valgrind -v -v". It shows some errors
or something so maybe it's still of use. I'll post if I can get it to
crash though.



On Sun, Dec 14, 2014 at 10:20 AM, Peter Stephenson
<p.w.stephenson@ntlworld.com> wrote:
> On Sat, 13 Dec 2014 20:40:32 -0800
> Bart Schaefer <schaefer@brasslantern.com> wrote:
>> On Dec 13,  3:36pm, Jonathan H wrote:
>> }
>> } $ZSH_PATCHLEVEL == "zsh-5.0.7-0-g208bded"
>> } $(uname -a) == "Linux protogon.localdomain 3.17.6-1-ARCH #1 SMP
>> } PREEMPT Sun Dec 7 23:43:32 UTC 2014 x86_64 GNU/Linux"
>> }
>> } I've attached the output of gdb backtrace, watch and the headers.
>>
>> OK, thanks.  If you look closely at that backtrace, you'll see that the
>> shell is actually inside the zle-line-init widget, which means that the
>> entire editor is just starting up:
>>
>> #364 "zle-line-init", arg=0x0) at zle_utils.c:1706
>>
>> This calls through here:
>>...
>> #280 recursiveedit (args=0x7fb1f7f4ba70) at zle_main.c:181
>>
>> So at this point we haven't even finished initializing ZLE yet, but one of
>> these "auto-fu" functions has recursively invoked it.  This is a recipe for
>> disaster if ever I saw one.  I suspect recursive-edit should simply throw
>> an error if it's invoked from zle-line-init, but PWS may be able to speak
>> better to this.
>
> I'm not actually what would go wrong here.
>
> After zle-line-init runs (in zleread),the next thing we do is zrefresh()
> and then zlecore().  So I think it *has* finished initialising ---
> zrefresh() and zlecore() are the stuff that we can only do when zsh is
> set up and we can do them at this point.
>
> Indeed, zlecore() is basically what recursive-edit does, although
> there's quite lot in the way in the hook stuff in execzlefunc().  So if
> something's going wrong here it's the hooking rather than the not being
> started that should prevent a recursive edit.  But I still don't know
> what it is we can't allow because of what.
>
>> At this point we're already either hosed or about to be because ZLE isn't
>> ready to be re-entered yet within zle-line-init
>
> I don't actually see why not, as I said above.
>
>> Oh-my-zsh syntax highlighting is known to tickle several subtle crash-
>> inducing memory errors
>
> This is probably more to the point.
>
>> #126 completecall (args=0x7fb1f7f38918) at zle_tricky.c:208
>
> This is utterly bizarre, but, again, I'm not really sure what the core
> shell should be disallowing.  It's up to the user rather than the shell
> not to complete anything before they've even started up the command
> line...
>
>> Anyway, the location of the crash is just where the badly-freed or in some
>> other way abused chunk of memory, from some previous error, finally gets
>> re-used.
>
> Would it be possible to run valgrind on this, if it's sufficiently
> reproducible?
>
> pws

[-- Attachment #2: zsh_valgrind.log --]
[-- Type: application/octet-stream, Size: 4332058 bytes --]

==7806== Memcheck, a memory error detector
==7806== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==7806== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==7806== Command: ./zsh
==7806== 
--7806-- Valgrind options:
--7806--    -v
--7806--    -v
--7806-- Contents of /proc/version:
--7806--   Linux version 3.17.6-1-ARCH (builduser@foutrelis) (gcc version 4.9.2 (GCC) ) #1 SMP PREEMPT Sun Dec 7 23:43:32 UTC 2014
--7806-- Arch and hwcaps: AMD64, LittleEndian, amd64-rdtscp-sse3
--7806-- Page sizes: currently 4096, max supported 4096
--7806-- Valgrind library directory: /usr/lib/valgrind
--7806-- TT/TC: VG_(init_tt_tc) (startup of code management)
--7806-- TT/TC: cache: 16 sectors of 27597024 bytes each = 441552384 total
--7806-- TT/TC: table: 16 tables  of 12580032 bytes each = 201280512 total
--7806-- TT/TC: table: 65521 entries each = 1048336 total entries max occupancy 681408 (65%)
==7806== Adding active redirection:
--7806--     new: 0xffffffffff600000 (???                 ) R-> (0000.0) 0x380c1e33 ???
==7806== Adding active redirection:
--7806--     new: 0xffffffffff600400 (???                 ) R-> (0000.0) 0x380c1e3d ???
==7806== Adding active redirection:
--7806--     new: 0xffffffffff600800 (???                 ) R-> (0000.0) 0x380c1e47 ???
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/bin/zsh
--7806--    svma 0x000040e430, avma 0x000040e430
--7806-- Reading syms from /usr/lib/ld-2.20.so
--7806--    svma 0x0000000bc0, avma 0x0004000bc0
--7806-- summarise_context(loc_start = 0x10): cannot summarise(why=1):   
0x3c0: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x3c7): cannot summarise(why=1):   
0x4ce: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x4d3): cannot summarise(why=1):   
0x7c0: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x7c7): cannot summarise(why=1):   
0x8c0: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x8c5): cannot summarise(why=1):   
0x974: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x97b): cannot summarise(why=1):   
0xa1c: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x2d): cannot summarise(why=1):   
0x4a: [0]={ 0(r5) { u  u  u  c0 u  u  r9 r8 u  u  u  u  c16 c24 c32 c40 r1 u  u  u  }
==7806== Adding active redirection:
--7806--     new: 0x04018ad0 (strlen              ) R-> (0000.0) 0x380c1e51 ???
--7806-- Reading syms from /usr/lib/valgrind/memcheck-amd64-linux
--7806--    svma 0x0038000150, avma 0x0038000150
--7806--    object doesn't have a symbol table
--7806--    object doesn't have a dynamic symbol table
--7806-- Scheduler: using generic scheduler lock implementation.
--7806-- Reading suppressions file: /usr/lib/valgrind/default.supp
==7806== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7806-by-pythonnut-on-???
==7806== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7806-by-pythonnut-on-???
==7806== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7806-by-pythonnut-on-???
==7806== 
==7806== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7806== don't want to do, unless you know exactly what you're doing,
==7806== or are doing some strange experiment):
==7806==   /usr/lib/valgrind/../../bin/vgdb --pid=7806 ...command...
==7806== 
==7806== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7806==   /path/to/gdb ./zsh
==7806== and then give GDB the following command
==7806==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7806
==7806== --pid is optional if only one valgrind process is running
==7806== 
--7806-- TT/TC: initialise sector 0
--7806-- REDIR: 0x4018ad0 (ld-linux-x86-64.so.2:strlen) redirected to 0x380c1e51 (???)
--7806-- Reading syms from /usr/lib/valgrind/vgpreload_core-amd64-linux.so
--7806--    svma 0x00000005d0, avma 0x0004a245d0
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so
--7806--    svma 0x00000038e0, avma 0x0004c298e0
--7806--    object doesn't have a symbol table
==7806== Adding active redirection:
--7806--     new: 0x04018880 (index               ) R-> (2002.0) 0x04c2d180 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x04018880 (index               ) R-> (2002.0) 0x04c2d180 index
--7806--     new: 0x04018880 (index               ) R-> (2002.0) 0x04c2d140 strchr
==7806== Adding active redirection:
--7806--     new: 0x04018aa0 (strcmp              ) R-> (2016.0) 0x04c2e680 strcmp
==7806== WARNING: new redirection conflicts with existing -- ignoring it
--7806--     old: 0x04018ad0 (strlen              ) R-> (0000.0) 0x380c1e51 ???
--7806--     new: 0x04018ad0 (strlen              ) R-> (2007.0) 0x04c2d5d0 strlen
==7806== Adding active redirection:
--7806--     new: 0x040197c0 (mempcpy             ) R-> (2029.0) 0x04c311d0 mempcpy
==7806== Adding active redirection:
--7806--     new: 0x04019910 (stpcpy              ) R-> (2020.0) 0x04c30560 stpcpy
--7806-- REDIR: 0x4018880 (ld-linux-x86-64.so.2:index) redirected to 0x4c2d180 (index)
--7806-- REDIR: 0x4018aa0 (ld-linux-x86-64.so.2:strcmp) redirected to 0x4c2e680 (strcmp)
--7806-- REDIR: 0x40197c0 (ld-linux-x86-64.so.2:mempcpy) redirected to 0x4c311d0 (mempcpy)
--7806-- Reading syms from /usr/lib/libgdbm.so.4.0.0
--7806--    svma 0x0000002c60, avma 0x0004e38c60
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libdl-2.20.so
--7806--    svma 0x0000000ed0, avma 0x0005042ed0
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libncursesw.so.5.9
--7806--    svma 0x0000015130, avma 0x000525b130
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/librt-2.20.so
--7806--    svma 0x00000022f0, avma 0x00054b02f0
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libm-2.20.so
--7806--    svma 0x0000005580, avma 0x00056bb580
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libc-2.20.so
--7806--    svma 0x000001f4d0, avma 0x00059da4d0
--7806-- summarise_context(loc_start = 0x33): cannot summarise(why=1):   
0x50: [0]={ 0(r5) { u  u  u  c0 u  u  r9 r8 u  u  u  u  c16 c24 c32 c40 r1 u  u  u  }
--7806-- summarise_context(loc_start = 0x35): cannot summarise(why=1):   
0x7d: [0]={ 0(r5) { u  u  u  c128 u  u  c120 c160 u  u  u  u  c72 c80 c88 c96 c168 u  u  u  }
--7806-- summarise_context(loc_start = 0x1): cannot summarise(why=2):   
0x25: [0]={ 0(r7) { u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  r5 u  u  u  }
--7806-- summarise_context(loc_start = 0x25): cannot summarise(why=2):   
0x4b: [0]={ 8(r7) { u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  r5 u  u  u  }
--7806-- summarise_context(loc_start = 0x83): cannot summarise(why=1):   
0xa0: [0]={ 0(r5) { u  u  u  c0 u  u  r9 r8 u  u  u  u  c16 c24 c32 c40 r1 u  u  u  }
==7806== Adding active redirection:
--7806--     new: 0x059f0be0 (putenv              ) W-> (0000.0) 0x04c31930 putenv
==7806== Adding active redirection:
--7806--     new: 0x059f1030 (setenv              ) W-> (0000.0) 0x04c31a70 setenv
==7806== Adding active redirection:
--7806--     new: 0x059f1090 (unsetenv            ) W-> (0000.0) 0x04c319d0 unsetenv
==7806== Adding active redirection:
--7806--     new: 0x05a37440 (malloc              ) R-> (1001.0) 0x04c29f20 malloc
==7806== Adding active redirection:
--7806--     new: 0x05a376b0 (malloc_get_state    ) R-> (1018.0) 0x04c29e10 malloc_get_state
==7806== Adding active redirection:
--7806--     new: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b190 free
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b190 free
--7806--     new: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b3a0 cfree
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b190 free
--7806--     new: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b3a0 cfree
==7806== Adding active redirection:
--7806--     new: 0x05a37bb0 (realloc             ) R-> (1009.0) 0x04c2c220 realloc
==7806== Adding active redirection:
--7806--     new: 0x05a37e70 (memalign            ) R-> (1011.0) 0x04c2c480 memalign
==7806== Adding active redirection:
--7806--     new: 0x05a37e80 (calloc              ) R-> (1007.0) 0x04c2c000 calloc
==7806== Adding active redirection:
--7806--     new: 0x05a381b0 (malloc_usable_size  ) R-> (1017.0) 0x04c2c7c0 malloc_usable_size
==7806== Adding active redirection:
--7806--     new: 0x05a38290 (mallopt             ) R-> (1014.0) 0x04c29da0 mallopt
==7806== Adding active redirection:
--7806--     new: 0x05a389a0 (malloc_set_state    ) R-> (1018.0) 0x04c29e20 malloc_set_state
==7806== Adding active redirection:
--7806--     new: 0x05a38ef0 (valloc              ) R-> (1012.0) 0x04c2c590 valloc
==7806== Adding active redirection:
--7806--     new: 0x05a38f40 (pvalloc             ) R-> (1018.0) 0x04c29e00 pvalloc
==7806== Adding active redirection:
--7806--     new: 0x05a38fc0 (malloc_trim         ) R-> (1015.0) 0x04c29de0 malloc_trim
==7806== Adding active redirection:
--7806--     new: 0x05a39280 (mallinfo            ) R-> (1020.0) 0x04c2cb80 mallinfo
==7806== Adding active redirection:
--7806--     new: 0x05a393a0 (malloc_stats        ) R-> (1019.0) 0x04c29e30 malloc_stats
==7806== Adding active redirection:
--7806--     new: 0x05a39580 (posix_memalign      ) R-> (1016.0) 0x04c2c610 posix_memalign
==7806== Adding active redirection:
--7806--     new: 0x05a3afc0 (strcat              ) R-> (2003.0) 0x04c2d1c0 strcat
==7806== Adding active redirection:
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
==7806== Adding active redirection:
--7806--     new: 0x05a3b1c0 (index               ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1c0 (index               ) R-> (2002.0) 0x04c2d080 index
--7806--     new: 0x05a3b1c0 (index               ) R-> (2002.0) 0x04c2cf80 strchr
==7806== Adding active redirection:
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d000 __strchr_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3b410 (strcmp              ) R-> (2016.0) 0x04c2e540 strcmp
==7806== Adding active redirection:
--7806--     new: 0x05a3b450 (__GI_strcmp         ) R-> (2016.0) 0x04c2e590 __GI_strcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b450 (__GI_strcmp         ) R-> (2016.0) 0x04c2e590 __GI_strcmp
--7806--     new: 0x05a3b450 (__GI_strcmp         ) R-> (2016.0) 0x04c2e5e0 __strcmp_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3c8a0 (strcpy              ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Adding active redirection:
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
==7806== Adding active redirection:
--7806--     new: 0x05a3c9c0 (strcspn             ) R-> (2033.0) 0x04c315d0 strcspn
==7806== Adding active redirection:
--7806--     new: 0x05a3ce70 (strlen              ) R-> (2007.0) 0x04c2d510 strlen
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3ce70 (strlen              ) R-> (2007.0) 0x04c2d510 strlen
--7806--     new: 0x05a3ce70 (strlen              ) R-> (2007.0) 0x04c2d530 __GI_strlen
==7806== Adding active redirection:
--7806--     new: 0x05a3d030 (strnlen             ) R-> (2006.0) 0x04c2d490 strnlen
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d030 (strnlen             ) R-> (2006.0) 0x04c2d490 strnlen
--7806--     new: 0x05a3d030 (strnlen             ) R-> (2006.0) 0x04c2d4d0 __GI_strnlen
==7806== Adding active redirection:
--7806--     new: 0x05a3d250 (strncat             ) R-> (2004.0) 0x04c2d380 strncat
==7806== Adding active redirection:
--7806--     new: 0x05a3d290 (strncmp             ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Adding active redirection:
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dd30 __strncmp_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3eb30 (strncpy             ) R-> (2009.0) 0x04c2d790 strncpy
==7806== Adding active redirection:
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce90 __GI_strrchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce30 strrchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce30 strrchr
==7806== Adding active redirection:
--7806--     new: 0x05a3ee60 (strpbrk             ) R-> (2032.0) 0x04c31570 strpbrk
==7806== Adding active redirection:
--7806--     new: 0x05a3f1d0 (strspn              ) R-> (2034.0) 0x04c31640 strspn
==7806== Adding active redirection:
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3fc40 (strstr              ) R-> (2031.0) 0x04c313c0 strstr
==7806== Adding active redirection:
--7806--     new: 0x05a3fe80 (memchr              ) R-> (2017.0) 0x04c2e720 memchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3fe80 (memchr              ) R-> (2017.0) 0x04c2e720 memchr
--7806--     new: 0x05a3fe80 (memchr              ) R-> (2017.0) 0x04c2e760 __GI_memchr
==7806== Adding active redirection:
--7806--     new: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c300d0 bcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c300d0 bcmp
--7806--     new: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c2ffd0 memcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c300d0 bcmp
--7806--     new: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c2ffd0 memcmp
==7806== Adding active redirection:
--7806--     new: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30010 __GI_memcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30010 __GI_memcmp
--7806--     new: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30050 __memcmp_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c30a90 __GI_memmove
==7806== Adding active redirection:
--7806--     new: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806--     new: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c30810 memmove
==7806== Ignoring lower priority redirection:
--7806--     old: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806--     new: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.0) 0x04c2ed70 memcpy
==7806== Adding active redirection:
--7806--     new: 0x05a407f0 (memset              ) R-> (2021.0) 0x04c30760 memset
==7806== Adding active redirection:
--7806--     new: 0x05a40960 (mempcpy             ) R-> (2029.0) 0x04c30f00 mempcpy
==7806== Adding active redirection:
--7806--     new: 0x05a40e20 (bcopy               ) R-> (2023.0) 0x04c30d10 bcopy
==7806== Adding active redirection:
--7806--     new: 0x05a40e60 (stpcpy              ) R-> (2020.0) 0x04c30150 stpcpy
==7806== Adding active redirection:
--7806--     new: 0x05a40ea0 (__GI_stpcpy         ) R-> (2020.0) 0x04c30220 __GI_stpcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40ea0 (__GI_stpcpy         ) R-> (2020.0) 0x04c30220 __GI_stpcpy
--7806--     new: 0x05a40ea0 (__GI_stpcpy         ) R-> (2020.0) 0x04c302f0 __stpcpy_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a40f80 (stpncpy             ) R-> (2042.0) 0x04c30630 stpncpy
==7806== Adding active redirection:
--7806--     new: 0x05a40fc0 (strcasecmp_l        ) R-> (2014.0) 0x04c2e090 strcasecmp_l
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40fc0 (strcasecmp_l        ) R-> (2014.0) 0x04c2e090 strcasecmp_l
--7806--     new: 0x05a40fc0 (strcasecmp_l        ) R-> (2014.0) 0x04c2e120 __GI_strcasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a41010 (strcasecmp          ) R-> (2012.0) 0x04c2de10 strcasecmp
==7806== Adding active redirection:
--7806--     new: 0x05a41080 (__GI___strcasecmp_l ) R-> (2014.0) 0x04c2e1b0 __GI___strcasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a432b0 (strncasecmp_l       ) R-> (2015.0) 0x04c2e240 strncasecmp_l
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a432b0 (strncasecmp_l       ) R-> (2015.0) 0x04c2e240 strncasecmp_l
--7806--     new: 0x05a432b0 (strncasecmp_l       ) R-> (2015.0) 0x04c2e340 __GI_strncasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a43300 (strncasecmp         ) R-> (2013.0) 0x04c2def0 strncasecmp
==7806== Adding active redirection:
--7806--     new: 0x05a43370 (__GI___strncasecmp_l) R-> (2015.0) 0x04c2e440 __GI___strncasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a459e0 (memcpy@@GLIBC_2.14  ) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a459e0 (memcpy@@GLIBC_2.14  ) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
--7806--     new: 0x05a459e0 (memcpy@@GLIBC_2.14  ) R-> (2018.0) 0x04c2ed70 memcpy
==7806== Adding active redirection:
--7806--     new: 0x05a45a50 (__GI_memcpy         ) R-> (2018.0) 0x04c2f080 __GI_memcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a45a50 (__GI_memcpy         ) R-> (2018.0) 0x04c2f080 __GI_memcpy
--7806--     new: 0x05a45a50 (__GI_memcpy         ) R-> (2018.0) 0x04c2f390 __memcpy_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a46f30 (strcasestr          ) R-> (2035.0) 0x04c316b0 strcasestr
==7806== Adding active redirection:
--7806--     new: 0x05a477a0 (rawmemchr           ) R-> (2026.0) 0x04c30e20 rawmemchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a477a0 (rawmemchr           ) R-> (2026.0) 0x04c30e20 rawmemchr
--7806--     new: 0x05a477a0 (rawmemchr           ) R-> (2026.0) 0x04c30e40 __GI___rawmemchr
==7806== Adding active redirection:
--7806--     new: 0x05a479b0 (strchrnul           ) R-> (2025.0) 0x04c30df0 strchrnul
==7806== Adding active redirection:
--7806--     new: 0x05a4ae20 (memrchr             ) R-> (2036.0) 0x04c2e7a0 memrchr
==7806== Adding active redirection:
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d9f0 __strncpy_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a50bc0 (__strncpy_sse2_unali) R-> (2009.0) 0x04c2db20 __strncpy_sse2_unaligned
==7806== Adding active redirection:
--7806--     new: 0x05a51ba0 (__stpcpy_sse2_unalig) R-> (2020.0) 0x04c303c0 __stpcpy_sse2_unaligned
==7806== Adding active redirection:
--7806--     new: 0x05a55790 (wcschr              ) R-> (2040.0) 0x04c318d0 wcschr
==7806== Adding active redirection:
--7806--     new: 0x05a55920 (wcscmp              ) R-> (2038.0) 0x04c317b0 wcscmp
==7806== Adding active redirection:
--7806--     new: 0x05a565f0 (wcscpy              ) R-> (2039.0) 0x04c31800 wcscpy
==7806== Adding active redirection:
--7806--     new: 0x05a566b0 (wcslen              ) R-> (2037.0) 0x04c31790 wcslen
==7806== Adding active redirection:
--7806--     new: 0x05a56c00 (wcsrchr             ) R-> (2041.0) 0x04c31900 wcsrchr
==7806== Adding active redirection:
--7806--     new: 0x05ab0d00 (__memcpy_chk        ) R-> (2030.0) 0x04c312c0 __memcpy_chk
==7806== Adding active redirection:
--7806--     new: 0x05ab0d70 (__memmove_chk       ) R-> (2024.0) 0x04c30d70 __memmove_chk
==7806== Adding active redirection:
--7806--     new: 0x05ab0e50 (__stpcpy_chk        ) R-> (2028.0) 0x04c30eb0 __stpcpy_chk
==7806== Adding active redirection:
--7806--     new: 0x05ab1020 (__strcpy_chk        ) R-> (2027.0) 0x04c30e60 __strcpy_chk
==7806== Adding active redirection:
--7806--     new: 0x05ad9400 (__strcmp_sse42      ) R-> (2016.0) 0x04c2e630 __strcmp_sse42
==7806== Adding active redirection:
--7806--     new: 0x05ada1b0 (__strncmp_sse42     ) R-> (2011.0) 0x04c2dda0 __strncmp_sse42
==7806== Adding active redirection:
--7806--     new: 0x05b02b50 (__memcmp_sse4_1     ) R-> (2019.0) 0x04c30090 __memcmp_sse4_1
==7806== Adding active redirection:
--7806--     new: 0x05b04fc0 (__strchr_sse2_no_bsf) R-> (2002.0) 0x04c2d040 __strchr_sse2_no_bsf
--7806-- Reading syms from /usr/lib/libpthread-2.20.so
--7806--    svma 0x0000005a70, avma 0x0005d63a70
--7806-- REDIR: 0x5a41010 (libc.so.6:strcasecmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a41070 (__strcasecmp_sse2   ) R-> (2012.0) 0x04c2de10 strcasecmp
--7806-- REDIR: 0x5a43300 (libc.so.6:strncasecmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a43360 (__strncasecmp_sse2  ) R-> (2013.0) 0x04c2def0 strncasecmp
--7806-- REDIR: 0x5a40790 (libc.so.6:memcpy@GLIBC_2.2.5) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c30a90 __GI_memmove
--7806--     new: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- REDIR: 0x5a3eb70 (libc.so.6:rindex) redirected to 0x4c2ce60 (rindex)
--7806-- REDIR: 0x5a3b450 (libc.so.6:__GI_strcmp) redirected to 0x4c2e590 (__GI_strcmp)
--7806-- REDIR: 0x5a3ce70 (libc.so.6:strlen) redirected to 0x4c2d510 (strlen)
--7806-- REDIR: 0x5a3d2e0 (libc.so.6:__GI_strncmp) redirected to 0x4c2dcc0 (__GI_strncmp)
--7806-- REDIR: 0x5a3b1f0 (libc.so.6:__GI_strchr) redirected to 0x4c2cfc0 (__GI_strchr)
--7806-- REDIR: 0x5a3fe80 (libc.so.6:memchr) redirected to 0x4c2e720 (memchr)
--7806-- REDIR: 0x5a479b0 (libc.so.6:strchrnul) redirected to 0x4c30df0 (strchrnul)
--7806-- REDIR: 0x5a37440 (libc.so.6:malloc) redirected to 0x4c29f20 (malloc)
--7806-- REDIR: 0x5a45a50 (libc.so.6:__GI_memcpy) redirected to 0x4c2f080 (__GI_memcpy)
--7806-- REDIR: 0x5a37b10 (libc.so.6:free) redirected to 0x4c2b190 (free)
--7806-- REDIR: 0x5a407f0 (libc.so.6:memset) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a40860 (__GI_memset         ) R-> (2021.0) 0x04c30760 memset
--7806-- REDIR: 0x5a40860 (libc.so.6:__GI_memset) redirected to 0x4c30760 (memset)
--7806-- REDIR: 0x5a3b1c0 (libc.so.6:index) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
--7806-- REDIR: 0x5a3b410 (libc.so.6:strcmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a4b720 (__strcmp_sse2_unalig) R-> (2016.0) 0x04c2e540 strcmp
--7806-- REDIR: 0x5a4b720 (libc.so.6:__strcmp_sse2_unaligned) redirected to 0x4c2e540 (strcmp)
--7806-- REDIR: 0x5a3c8a0 (libc.so.6:strcpy) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0x5a3c8e0 (libc.so.6:__GI_strcpy) redirected to 0x4c2d6c0 (__GI_strcpy)
--7806-- REDIR: 0xffffffffff600000 (???:???) redirected to 0x380c1e33 (???)
--7806-- REDIR: 0x5a3f790 (libc.so.6:__GI_strstr) redirected to 0x4c31450 (__strstr_sse2)
--7806-- REDIR: 0x5a40ea0 (libc.so.6:__GI_stpcpy) redirected to 0x4c30220 (__GI_stpcpy)
--7806-- REDIR: 0x5a37e80 (libc.so.6:calloc) redirected to 0x4c2c000 (calloc)
--7806-- Reading syms from /usr/lib/libnss_files-2.20.so
--7806--    svma 0x0000002290, avma 0x000637c290
--7806--    object doesn't have a symbol table
--7806-- REDIR: 0x5a459e0 (libc.so.6:memcpy@@GLIBC_2.14) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a4b9d0 (__memcpy_sse2_unalig) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
--7806-- REDIR: 0x5a4b9d0 (libc.so.6:__memcpy_sse2_unaligned) redirected to 0x4c2ea60 (memcpy@@GLIBC_2.14)
--7806-- REDIR: 0x5a40210 (libc.so.6:__GI_memcmp) redirected to 0x4c30010 (__GI_memcmp)
--7806-- REDIR: 0x5a3d030 (libc.so.6:strnlen) redirected to 0x4c2d490 (strnlen)
--7806-- REDIR: 0x5a477a0 (libc.so.6:rawmemchr) redirected to 0x4c30e20 (rawmemchr)
--7806-- REDIR: 0x5a4b610 (libc.so.6:__GI_strncpy) redirected to 0x4c2d8c0 (__GI_strncpy)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0xffffffffff600400 (???:???) redirected to 0x380c1e3d (???)
--7806-- REDIR: 0x5a37bb0 (libc.so.6:realloc) redirected to 0x4c2c220 (realloc)
--7806-- REDIR: 0x5a3eb30 (libc.so.6:strncpy) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d790 strncpy
--7806-- REDIR: 0x5a3d290 (libc.so.6:strncmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
--7806-- REDIR: 0x59f1030 (libc.so.6:setenv) redirected to 0x4c31a70 (setenv)
client request: code 4d430005,  addr 0xFFEFFFACC,  len 4
client request: code 4d430005,  addr 0xFFEFFF7CC,  len 4
client request: code 4d430005,  addr 0xFFEFFF7CC,  len 4
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/newuser.so
--7806--    svma 0x0000000880, avma 0x0006587880
--7806-- Discarding syms at 0x6587880-0x6587b9a in /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/newuser.so due to munmap()
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c30a90 __GI_memmove
--7806--     new: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- REDIR: 0x5a40610 (libc.so.6:__GI_memmove) redirected to 0x4c30a90 (__GI_memmove)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
client request: code 4d430005,  addr 0xFFEFFEDDC,  len 4
--7807-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7807== Ignoring duplicate redirection:
--7807--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7807--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--7807-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF5F5C,  len 4
==7807== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7807-by-pythonnut-on-???
==7807== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7807-by-pythonnut-on-???
==7807== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7807-by-pythonnut-on-???
==7807== 
==7807== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7807== don't want to do, unless you know exactly what you're doing,
==7807== or are doing some strange experiment):
==7807==   /usr/lib/valgrind/../../bin/vgdb --pid=7807 ...command...
==7807== 
==7807== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7807==   /path/to/gdb ./zsh
==7807== and then give GDB the following command
==7807==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7807
==7807== --pid is optional if only one valgrind process is running
==7807== 
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zle.so
--7806--    svma 0x0000016120, avma 0x000659d120
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
--7806-- REDIR: 0x5a3fc40 (libc.so.6:strstr) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/complete.so
--7806--    svma 0x0000008930, avma 0x00067e1930
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zutil.so
--7806--    svma 0x0000001e30, avma 0x0006a04e30
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d790 strncpy
--7806-- REDIR: 0x5a3f1d0 (libc.so.6:strspn) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a3f200 (__GI_strspn         ) R-> (2034.0) 0x04c31640 strspn
--7806-- REDIR: 0x5a3f200 (libc.so.6:__GI_strspn) redirected to 0x4c31640 (strspn)
--7806-- REDIR: 0x5a401d0 (libc.so.6:bcmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30010 __GI_memcmp
--7806--     new: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c300d0 bcmp
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/parameter.so
--7806--    svma 0x0000003070, avma 0x0006c0f070
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/stat.so
--7806--    svma 0x0000001180, avma 0x0006e18180
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
--7818-- Caught __NR_exit; running __libc_freeres()
==7818== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7818-by-pythonnut-on-???
==7818== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7818-by-pythonnut-on-???
==7818== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7818-by-pythonnut-on-???
==7818== 
==7818== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7818== don't want to do, unless you know exactly what you're doing,
==7818== or are doing some strange experiment):
==7818==   /usr/lib/valgrind/../../bin/vgdb --pid=7818 ...command...
==7818== 
==7818== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7818==   /path/to/gdb ./zsh
==7818== and then give GDB the following command
==7818==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7818
==7818== --pid is optional if only one valgrind process is running
==7818== 
--7818-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7818== 
==7818== HEAP SUMMARY:
==7818==     in use at exit: 479,663 bytes in 12,406 blocks
==7818==   total heap usage: 51,306 allocs, 38,900 frees, 5,584,812 bytes allocated
==7818== 
==7818== Searching for pointers to 12,406 not-freed blocks
--7818--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7818--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7818--   Scanning root segment: 0x4022000..0x4043fff (139264)
--7818--   Scanning root segment: 0x4049000..0x404cfff (16384)
--7818--   Scanning root segment: 0x4222000..0x4222fff (4096)
--7818--   Scanning root segment: 0x4223000..0x4223fff (4096)
--7818--   Scanning root segment: 0x4224000..0x4224fff (4096)
--7818--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7818--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7818--   Scanning root segment: 0x5041000..0x5041fff (4096)
--7818--   Scanning root segment: 0x5245000..0x5245fff (4096)
--7818--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--7818--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--7818--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7818--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--7818--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7818--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7818--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7818--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7818--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7818--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7818--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7818--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7818--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7818--   Scanning root segment: 0x701a000..0x701afff (4096)
--7818--   Scanning root segment: 0xffeff8000..0xfff000fff (36864)
==7818== Checked 877,968 bytes
==7818== 
==7818== LEAK SUMMARY:
==7818==    definitely lost: 0 bytes in 0 blocks
==7818==    indirectly lost: 0 bytes in 0 blocks
==7818==      possibly lost: 0 bytes in 0 blocks
==7818==    still reachable: 479,663 bytes in 12,406 blocks
==7818==         suppressed: 0 bytes in 0 blocks
==7818== Rerun with --leak-check=full to see details of leaked memory
==7818== 
==7818== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7818== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7877== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7877-by-pythonnut-on-???
==7877== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7877-by-pythonnut-on-???
==7877== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7877-by-pythonnut-on-???
==7877== 
==7877== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7877== don't want to do, unless you know exactly what you're doing,
==7877== or are doing some strange experiment):
==7877==   /usr/lib/valgrind/../../bin/vgdb --pid=7877 ...command...
==7877== 
==7877== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7877==   /path/to/gdb ./zsh
==7877== and then give GDB the following command
==7877==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7877
==7877== --pid is optional if only one valgrind process is running
==7877== 
--7877-- Caught __NR_exit; running __libc_freeres()
--7877-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7877== 
==7877== HEAP SUMMARY:
==7877==     in use at exit: 479,997 bytes in 12,413 blocks
==7877==   total heap usage: 51,337 allocs, 38,924 frees, 5,586,425 bytes allocated
==7877== 
==7877== Searching for pointers to 12,413 not-freed blocks
--7877--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7877--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7877--   Scanning root segment: 0x4022000..0x4043fff (139264)
--7877--   Scanning root segment: 0x4049000..0x404cfff (16384)
--7877--   Scanning root segment: 0x4222000..0x4222fff (4096)
--7877--   Scanning root segment: 0x4223000..0x4223fff (4096)
--7877--   Scanning root segment: 0x4224000..0x4224fff (4096)
--7877--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7877--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7877--   Scanning root segment: 0x5041000..0x5041fff (4096)
--7877--   Scanning root segment: 0x5245000..0x5245fff (4096)
--7877--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--7877--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--7877--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7877--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--7877--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7877--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7877--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7877--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7877--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7877--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7877--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7877--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7877--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7877--   Scanning root segment: 0x701a000..0x701afff (4096)
--7877--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==7877== Checked 878,168 bytes
==7877== 
==7877== LEAK SUMMARY:
==7877==    definitely lost: 0 bytes in 0 blocks
==7877==    indirectly lost: 0 bytes in 0 blocks
==7877==      possibly lost: 0 bytes in 0 blocks
==7877==    still reachable: 479,997 bytes in 12,413 blocks
==7877==         suppressed: 0 bytes in 0 blocks
==7877== Rerun with --leak-check=full to see details of leaked memory
==7877== 
==7877== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7877== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8031-- Caught __NR_exit; running __libc_freeres()
==8031== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8031-by-pythonnut-on-???
==8031== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8031-by-pythonnut-on-???
==8031== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8031-by-pythonnut-on-???
==8031== 
==8031== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8031== don't want to do, unless you know exactly what you're doing,
==8031== or are doing some strange experiment):
==8031==   /usr/lib/valgrind/../../bin/vgdb --pid=8031 ...command...
==8031== 
==8031== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8031==   /path/to/gdb ./zsh
==8031== and then give GDB the following command
==8031==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8031
==8031== --pid is optional if only one valgrind process is running
==8031== 
--8031-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8031== 
==8031== HEAP SUMMARY:
==8031==     in use at exit: 498,989 bytes in 12,948 blocks
==8031==   total heap usage: 56,969 allocs, 44,021 frees, 6,125,903 bytes allocated
==8031== 
==8031== Searching for pointers to 12,948 not-freed blocks
--8031--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8031--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8031--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8031--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8031--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8031--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8031--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8031--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8031--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8031--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8031--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8031--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8031--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8031--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8031--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8031--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8031--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8031--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8031--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8031--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8031--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8031--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8031--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8031--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8031--   Scanning root segment: 0x701a000..0x701afff (4096)
--8031--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8031== Checked 896,056 bytes
==8031== 
==8031== LEAK SUMMARY:
==8031==    definitely lost: 0 bytes in 0 blocks
==8031==    indirectly lost: 0 bytes in 0 blocks
==8031==      possibly lost: 0 bytes in 0 blocks
==8031==    still reachable: 498,989 bytes in 12,948 blocks
==8031==         suppressed: 0 bytes in 0 blocks
==8031== Rerun with --leak-check=full to see details of leaked memory
==8031== 
==8031== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8031== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8036-- Caught __NR_exit; running __libc_freeres()
==8036== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8036-by-pythonnut-on-???
==8036== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8036-by-pythonnut-on-???
==8036== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8036-by-pythonnut-on-???
==8036== 
==8036== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8036== don't want to do, unless you know exactly what you're doing,
==8036== or are doing some strange experiment):
==8036==   /usr/lib/valgrind/../../bin/vgdb --pid=8036 ...command...
==8036== 
==8036== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8036==   /path/to/gdb ./zsh
==8036== and then give GDB the following command
==8036==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8036
==8036== --pid is optional if only one valgrind process is running
==8036== 
--8036-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8036== 
==8036== HEAP SUMMARY:
==8036==     in use at exit: 499,480 bytes in 12,963 blocks
==8036==   total heap usage: 57,118 allocs, 44,155 frees, 6,136,379 bytes allocated
==8036== 
==8036== Searching for pointers to 12,963 not-freed blocks
--8036--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8036--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8036--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8036--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8036--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8036--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8036--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8036--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8036--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8036--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8036--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8036--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8036--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8036--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8036--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8036--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8036--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8036--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8036--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8036--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8036--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8036--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8036--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8036--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8036--   Scanning root segment: 0x701a000..0x701afff (4096)
--8036--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8036== Checked 896,472 bytes
==8036== 
==8036== LEAK SUMMARY:
==8036==    definitely lost: 0 bytes in 0 blocks
==8036==    indirectly lost: 0 bytes in 0 blocks
==8036==      possibly lost: 0 bytes in 0 blocks
==8036==    still reachable: 499,480 bytes in 12,963 blocks
==8036==         suppressed: 0 bytes in 0 blocks
==8036== Rerun with --leak-check=full to see details of leaked memory
==8036== 
==8036== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8036== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8038-- Caught __NR_exit; running __libc_freeres()
==8038== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8038-by-pythonnut-on-???
==8038== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8038-by-pythonnut-on-???
==8038== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8038-by-pythonnut-on-???
==8038== 
==8038== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8038== don't want to do, unless you know exactly what you're doing,
==8038== or are doing some strange experiment):
==8038==   /usr/lib/valgrind/../../bin/vgdb --pid=8038 ...command...
==8038== 
==8038== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8038==   /path/to/gdb ./zsh
==8038== and then give GDB the following command
==8038==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8038
==8038== --pid is optional if only one valgrind process is running
==8038== 
--8038-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8038== 
==8038== HEAP SUMMARY:
==8038==     in use at exit: 500,165 bytes in 12,984 blocks
==8038==   total heap usage: 57,303 allocs, 44,319 frees, 6,152,151 bytes allocated
==8038== 
==8038== Searching for pointers to 12,984 not-freed blocks
--8038--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8038--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8038--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8038--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8038--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8038--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8038--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8038--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8038--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8038--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8038--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8038--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8038--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8038--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8038--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8038--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8038--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8038--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8038--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8038--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8038--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8038--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8038--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8038--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8038--   Scanning root segment: 0x701a000..0x701afff (4096)
--8038--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8038== Checked 897,080 bytes
==8038== 
==8038== LEAK SUMMARY:
==8038==    definitely lost: 0 bytes in 0 blocks
==8038==    indirectly lost: 0 bytes in 0 blocks
==8038==      possibly lost: 0 bytes in 0 blocks
==8038==    still reachable: 500,165 bytes in 12,984 blocks
==8038==         suppressed: 0 bytes in 0 blocks
==8038== Rerun with --leak-check=full to see details of leaked memory
==8038== 
==8038== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8038== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8049-- Caught __NR_exit; running __libc_freeres()
==8049== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8049-by-pythonnut-on-???
==8049== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8049-by-pythonnut-on-???
==8049== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8049-by-pythonnut-on-???
==8049== 
==8049== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8049== don't want to do, unless you know exactly what you're doing,
==8049== or are doing some strange experiment):
==8049==   /usr/lib/valgrind/../../bin/vgdb --pid=8049 ...command...
==8049== 
==8049== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8049==   /path/to/gdb ./zsh
==8049== and then give GDB the following command
==8049==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8049
==8049== --pid is optional if only one valgrind process is running
==8049== 
--8049-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8049== 
==8049== HEAP SUMMARY:
==8049==     in use at exit: 503,703 bytes in 13,082 blocks
==8049==   total heap usage: 58,181 allocs, 45,099 frees, 6,240,064 bytes allocated
==8049== 
==8049== Searching for pointers to 13,082 not-freed blocks
--8049--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8049--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8049--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8049--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8049--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8049--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8049--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8049--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8049--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8049--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8049--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8049--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8049--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8049--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8049--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8049--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8049--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8049--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8049--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8049--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8049--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8049--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8049--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8049--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8049--   Scanning root segment: 0x701a000..0x701afff (4096)
--8049--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8049== Checked 900,440 bytes
==8049== 
==8049== LEAK SUMMARY:
==8049==    definitely lost: 0 bytes in 0 blocks
==8049==    indirectly lost: 0 bytes in 0 blocks
==8049==      possibly lost: 0 bytes in 0 blocks
==8049==    still reachable: 503,703 bytes in 13,082 blocks
==8049==         suppressed: 0 bytes in 0 blocks
==8049== Rerun with --leak-check=full to see details of leaked memory
==8049== 
==8049== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8049== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8050-- Caught __NR_exit; running __libc_freeres()
==8050== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8050-by-pythonnut-on-???
==8050== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8050-by-pythonnut-on-???
==8050== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8050-by-pythonnut-on-???
==8050== 
==8050== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8050== don't want to do, unless you know exactly what you're doing,
==8050== or are doing some strange experiment):
==8050==   /usr/lib/valgrind/../../bin/vgdb --pid=8050 ...command...
==8050== 
==8050== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8050==   /path/to/gdb ./zsh
==8050== and then give GDB the following command
==8050==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8050
==8050== --pid is optional if only one valgrind process is running
==8050== 
--8050-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8050== 
==8050== HEAP SUMMARY:
==8050==     in use at exit: 504,109 bytes in 13,096 blocks
==8050==   total heap usage: 58,329 allocs, 45,233 frees, 6,250,460 bytes allocated
==8050== 
==8050== Searching for pointers to 13,096 not-freed blocks
--8050--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8050--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8050--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8050--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8050--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8050--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8050--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8050--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8050--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8050--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8050--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8050--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8050--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8050--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8050--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8050--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8050--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8050--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8050--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8050--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8050--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8050--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8050--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8050--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8050--   Scanning root segment: 0x701a000..0x701afff (4096)
--8050--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8050== Checked 900,784 bytes
==8050== 
==8050== LEAK SUMMARY:
==8050==    definitely lost: 0 bytes in 0 blocks
==8050==    indirectly lost: 0 bytes in 0 blocks
==8050==      possibly lost: 0 bytes in 0 blocks
==8050==    still reachable: 504,109 bytes in 13,096 blocks
==8050==         suppressed: 0 bytes in 0 blocks
==8050== Rerun with --leak-check=full to see details of leaked memory
==8050== 
==8050== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8050== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8051-- Caught __NR_exit; running __libc_freeres()
==8051== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8051-by-pythonnut-on-???
==8051== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8051-by-pythonnut-on-???
==8051== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8051-by-pythonnut-on-???
==8051== 
==8051== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8051== don't want to do, unless you know exactly what you're doing,
==8051== or are doing some strange experiment):
==8051==   /usr/lib/valgrind/../../bin/vgdb --pid=8051 ...command...
==8051== 
==8051== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8051==   /path/to/gdb ./zsh
==8051== and then give GDB the following command
==8051==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8051
==8051== --pid is optional if only one valgrind process is running
==8051== 
--8051-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8051== 
==8051== HEAP SUMMARY:
==8051==     in use at exit: 542,450 bytes in 14,039 blocks
==8051==   total heap usage: 69,083 allocs, 55,044 frees, 7,240,905 bytes allocated
==8051== 
==8051== Searching for pointers to 14,039 not-freed blocks
--8051--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8051--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8051--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8051--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8051--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8051--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8051--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8051--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8051--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8051--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8051--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8051--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8051--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8051--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8051--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8051--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8051--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8051--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8051--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8051--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8051--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8051--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8051--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8051--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8051--   Scanning root segment: 0x701a000..0x701afff (4096)
--8051--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8051== Checked 936,992 bytes
==8051== 
==8051== LEAK SUMMARY:
==8051==    definitely lost: 0 bytes in 0 blocks
==8051==    indirectly lost: 0 bytes in 0 blocks
==8051==      possibly lost: 0 bytes in 0 blocks
==8051==    still reachable: 542,450 bytes in 14,039 blocks
==8051==         suppressed: 0 bytes in 0 blocks
==8051== Rerun with --leak-check=full to see details of leaked memory
==8051== 
==8051== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8051== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8052== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8052-by-pythonnut-on-???
==8052== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8052-by-pythonnut-on-???
==8052== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8052-by-pythonnut-on-???
==8052== 
==8052== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8052== don't want to do, unless you know exactly what you're doing,
==8052== or are doing some strange experiment):
==8052==   /usr/lib/valgrind/../../bin/vgdb --pid=8052 ...command...
==8052== 
==8052== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8052==   /path/to/gdb ./zsh
==8052== and then give GDB the following command
==8052==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8052
==8052== --pid is optional if only one valgrind process is running
==8052== 
--8052-- Caught __NR_exit; running __libc_freeres()
--8052-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8052== 
==8052== HEAP SUMMARY:
==8052==     in use at exit: 542,979 bytes in 14,059 blocks
==8052==   total heap usage: 69,251 allocs, 55,192 frees, 7,251,964 bytes allocated
==8052== 
==8052== Searching for pointers to 14,059 not-freed blocks
--8052--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8052--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8052--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8052--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8052--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8052--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8052--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8052--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8052--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8052--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8052--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8052--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8052--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8052--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8052--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8052--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8052--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8052--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8052--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8052--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8052--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8052--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8052--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8052--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8052--   Scanning root segment: 0x701a000..0x701afff (4096)
--8052--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8052== Checked 937,456 bytes
==8052== 
==8052== LEAK SUMMARY:
==8052==    definitely lost: 0 bytes in 0 blocks
==8052==    indirectly lost: 0 bytes in 0 blocks
==8052==      possibly lost: 0 bytes in 0 blocks
==8052==    still reachable: 542,979 bytes in 14,059 blocks
==8052==         suppressed: 0 bytes in 0 blocks
==8052== Rerun with --leak-check=full to see details of leaked memory
==8052== 
==8052== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8052== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8053-- Caught __NR_exit; running __libc_freeres()
==8053== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8053-by-pythonnut-on-???
==8053== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8053-by-pythonnut-on-???
==8053== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8053-by-pythonnut-on-???
==8053== 
==8053== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8053== don't want to do, unless you know exactly what you're doing,
==8053== or are doing some strange experiment):
==8053==   /usr/lib/valgrind/../../bin/vgdb --pid=8053 ...command...
==8053== 
==8053== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8053==   /path/to/gdb ./zsh
==8053== and then give GDB the following command
==8053==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8053
==8053== --pid is optional if only one valgrind process is running
==8053== 
--8053-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8053== 
==8053== HEAP SUMMARY:
==8053==     in use at exit: 543,239 bytes in 14,065 blocks
==8053==   total heap usage: 69,281 allocs, 55,216 frees, 7,253,498 bytes allocated
==8053== 
==8053== Searching for pointers to 14,065 not-freed blocks
--8053--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8053--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8053--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8053--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8053--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8053--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8053--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8053--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8053--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8053--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8053--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8053--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8053--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8053--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8053--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8053--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8053--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8053--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8053--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8053--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8053--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8053--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8053--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8053--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8053--   Scanning root segment: 0x701a000..0x701afff (4096)
--8053--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8053== Checked 937,592 bytes
==8053== 
==8053== LEAK SUMMARY:
==8053==    definitely lost: 0 bytes in 0 blocks
==8053==    indirectly lost: 0 bytes in 0 blocks
==8053==      possibly lost: 0 bytes in 0 blocks
==8053==    still reachable: 543,239 bytes in 14,065 blocks
==8053==         suppressed: 0 bytes in 0 blocks
==8053== Rerun with --leak-check=full to see details of leaked memory
==8053== 
==8053== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8053== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8054== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8054-by-pythonnut-on-???
==8054== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8054-by-pythonnut-on-???
==8054== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8054-by-pythonnut-on-???
==8054== 
==8054== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8054== don't want to do, unless you know exactly what you're doing,
==8054== or are doing some strange experiment):
==8054==   /usr/lib/valgrind/../../bin/vgdb --pid=8054 ...command...
==8054== 
==8054== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8054==   /path/to/gdb ./zsh
==8054== and then give GDB the following command
==8054==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8054
==8054== --pid is optional if only one valgrind process is running
==8054== 
--8054-- Caught __NR_exit; running __libc_freeres()
--8054-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8054== 
==8054== HEAP SUMMARY:
==8054==     in use at exit: 575,564 bytes in 15,016 blocks
==8054==   total heap usage: 78,805 allocs, 63,789 frees, 8,203,968 bytes allocated
==8054== 
==8054== Searching for pointers to 15,016 not-freed blocks
--8054--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8054--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8054--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8054--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8054--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8054--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8054--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8054--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8054--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8054--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8054--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8054--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8054--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8054--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8054--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8054--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8054--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8054--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8054--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8054--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8054--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8054--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8054--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8054--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8054--   Scanning root segment: 0x701a000..0x701afff (4096)
--8054--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8054== Checked 967,848 bytes
==8054== 
==8054== LEAK SUMMARY:
==8054==    definitely lost: 0 bytes in 0 blocks
==8054==    indirectly lost: 0 bytes in 0 blocks
==8054==      possibly lost: 0 bytes in 0 blocks
==8054==    still reachable: 575,564 bytes in 15,016 blocks
==8054==         suppressed: 0 bytes in 0 blocks
==8054== Rerun with --leak-check=full to see details of leaked memory
==8054== 
==8054== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8054== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8056-- Caught __NR_exit; running __libc_freeres()
==8056== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8056-by-pythonnut-on-???
==8056== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8056-by-pythonnut-on-???
==8056== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8056-by-pythonnut-on-???
==8056== 
==8056== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8056== don't want to do, unless you know exactly what you're doing,
==8056== or are doing some strange experiment):
==8056==   /usr/lib/valgrind/../../bin/vgdb --pid=8056 ...command...
==8056== 
==8056== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8056==   /path/to/gdb ./zsh
==8056== and then give GDB the following command
==8056==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8056
==8056== --pid is optional if only one valgrind process is running
==8056== 
--8056-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8056== 
==8056== HEAP SUMMARY:
==8056==     in use at exit: 575,833 bytes in 15,022 blocks
==8056==   total heap usage: 78,835 allocs, 63,813 frees, 8,205,527 bytes allocated
==8056== 
==8056== Searching for pointers to 15,022 not-freed blocks
--8056--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8056--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8056--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8056--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8056--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8056--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8056--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8056--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8056--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8056--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8056--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8056--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8056--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8056--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8056--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8056--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8056--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8056--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8056--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8056--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8056--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8056--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8056--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8056--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8056--   Scanning root segment: 0x701a000..0x701afff (4096)
--8056--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8056== Checked 967,984 bytes
==8056== 
==8056== LEAK SUMMARY:
==8056==    definitely lost: 0 bytes in 0 blocks
==8056==    indirectly lost: 0 bytes in 0 blocks
==8056==      possibly lost: 0 bytes in 0 blocks
==8056==    still reachable: 575,833 bytes in 15,022 blocks
==8056==         suppressed: 0 bytes in 0 blocks
==8056== Rerun with --leak-check=full to see details of leaked memory
==8056== 
==8056== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8056== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8143-- Caught __NR_exit; running __libc_freeres()
==8143== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8143-by-pythonnut-on-???
==8143== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8143-by-pythonnut-on-???
==8143== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8143-by-pythonnut-on-???
==8143== 
==8143== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8143== don't want to do, unless you know exactly what you're doing,
==8143== or are doing some strange experiment):
==8143==   /usr/lib/valgrind/../../bin/vgdb --pid=8143 ...command...
==8143== 
==8143== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8143==   /path/to/gdb ./zsh
==8143== and then give GDB the following command
==8143==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8143
==8143== --pid is optional if only one valgrind process is running
==8143== 
--8143-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8143== 
==8143== HEAP SUMMARY:
==8143==     in use at exit: 627,473 bytes in 16,376 blocks
==8143==   total heap usage: 92,846 allocs, 76,470 frees, 9,597,128 bytes allocated
==8143== 
==8143== Searching for pointers to 16,376 not-freed blocks
--8143--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8143--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8143--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8143--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8143--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8143--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8143--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8143--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8143--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8143--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8143--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8143--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8143--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8143--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8143--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8143--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8143--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8143--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8143--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8143--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8143--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8143--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8143--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8143--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8143--   Scanning root segment: 0x701a000..0x701afff (4096)
--8143--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8143== Checked 1,016,464 bytes
==8143== 
==8143== LEAK SUMMARY:
==8143==    definitely lost: 0 bytes in 0 blocks
==8143==    indirectly lost: 0 bytes in 0 blocks
==8143==      possibly lost: 0 bytes in 0 blocks
==8143==    still reachable: 627,473 bytes in 16,376 blocks
==8143==         suppressed: 0 bytes in 0 blocks
==8143== Rerun with --leak-check=full to see details of leaked memory
==8143== 
==8143== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8143== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8144-- Caught __NR_exit; running __libc_freeres()
==8144== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8144-by-pythonnut-on-???
==8144== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8144-by-pythonnut-on-???
==8144== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8144-by-pythonnut-on-???
==8144== 
==8144== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8144== don't want to do, unless you know exactly what you're doing,
==8144== or are doing some strange experiment):
==8144==   /usr/lib/valgrind/../../bin/vgdb --pid=8144 ...command...
==8144== 
==8144== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8144==   /path/to/gdb ./zsh
==8144== and then give GDB the following command
==8144==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8144
==8144== --pid is optional if only one valgrind process is running
==8144== 
--8144-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8144== 
==8144== HEAP SUMMARY:
==8144==     in use at exit: 638,116 bytes in 16,696 blocks
==8144==   total heap usage: 95,969 allocs, 79,273 frees, 9,911,953 bytes allocated
==8144== 
==8144== Searching for pointers to 16,696 not-freed blocks
--8144--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8144--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8144--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8144--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8144--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8144--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8144--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8144--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8144--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8144--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8144--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8144--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8144--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8144--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8144--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8144--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8144--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8144--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8144--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8144--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8144--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8144--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8144--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8144--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8144--   Scanning root segment: 0x701a000..0x701afff (4096)
--8144--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8144== Checked 1,026,440 bytes
==8144== 
==8144== LEAK SUMMARY:
==8144==    definitely lost: 0 bytes in 0 blocks
==8144==    indirectly lost: 0 bytes in 0 blocks
==8144==      possibly lost: 0 bytes in 0 blocks
==8144==    still reachable: 638,116 bytes in 16,696 blocks
==8144==         suppressed: 0 bytes in 0 blocks
==8144== Rerun with --leak-check=full to see details of leaked memory
==8144== 
==8144== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8144== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8145== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8145-by-pythonnut-on-???
==8145== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8145-by-pythonnut-on-???
==8145== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8145-by-pythonnut-on-???
==8145== 
==8145== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8145== don't want to do, unless you know exactly what you're doing,
==8145== or are doing some strange experiment):
==8145==   /usr/lib/valgrind/../../bin/vgdb --pid=8145 ...command...
==8145== 
==8145== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8145==   /path/to/gdb ./zsh
==8145== and then give GDB the following command
==8145==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8145
==8145== --pid is optional if only one valgrind process is running
==8145== 
--8145-- Caught __NR_exit; running __libc_freeres()
--8145-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8145== 
==8145== HEAP SUMMARY:
==8145==     in use at exit: 680,981 bytes in 17,979 blocks
==8145==   total heap usage: 109,039 allocs, 91,060 frees, 11,231,634 bytes allocated
==8145== 
==8145== Searching for pointers to 17,979 not-freed blocks
--8145--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8145--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8145--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8145--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8145--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8145--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8145--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8145--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8145--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8145--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8145--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8145--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8145--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8145--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8145--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8145--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8145--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8145--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8145--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8145--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8145--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8145--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8145--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8145--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8145--   Scanning root segment: 0x701a000..0x701afff (4096)
--8145--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8145== Checked 1,066,368 bytes
==8145== 
==8145== LEAK SUMMARY:
==8145==    definitely lost: 0 bytes in 0 blocks
==8145==    indirectly lost: 0 bytes in 0 blocks
==8145==      possibly lost: 0 bytes in 0 blocks
==8145==    still reachable: 680,981 bytes in 17,979 blocks
==8145==         suppressed: 0 bytes in 0 blocks
==8145== Rerun with --leak-check=full to see details of leaked memory
==8145== 
==8145== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8145== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8155== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8155-by-pythonnut-on-???
==8155== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8155-by-pythonnut-on-???
==8155== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8155-by-pythonnut-on-???
==8155== 
==8155== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8155== don't want to do, unless you know exactly what you're doing,
==8155== or are doing some strange experiment):
==8155==   /usr/lib/valgrind/../../bin/vgdb --pid=8155 ...command...
==8155== 
==8155== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8155==   /path/to/gdb ./zsh
==8155== and then give GDB the following command
==8155==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8155
==8155== --pid is optional if only one valgrind process is running
==8155== 
--8155-- Caught __NR_exit; running __libc_freeres()
--8155-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8155== 
==8155== HEAP SUMMARY:
==8155==     in use at exit: 862,691 bytes in 21,780 blocks
==8155==   total heap usage: 152,151 allocs, 130,371 frees, 16,612,056 bytes allocated
==8155== 
==8155== Searching for pointers to 21,780 not-freed blocks
--8155--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8155--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8155--   Scanning root segment: 0x4022000..0x4047fff (155648)
--8155--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8155--   Scanning root segment: 0x41d6000..0x41f9fff (147456)
--8155--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8155--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8155--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8155--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8155--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8155--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8155--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8155--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8155--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8155--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8155--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8155--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8155--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8155--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8155--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8155--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8155--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8155--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8155--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8155--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8155--   Scanning root segment: 0x701a000..0x701afff (4096)
--8155--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8155== Checked 1,398,384 bytes
==8155== 
==8155== LEAK SUMMARY:
==8155==    definitely lost: 0 bytes in 0 blocks
==8155==    indirectly lost: 0 bytes in 0 blocks
==8155==      possibly lost: 0 bytes in 0 blocks
==8155==    still reachable: 862,691 bytes in 21,780 blocks
==8155==         suppressed: 0 bytes in 0 blocks
==8155== Rerun with --leak-check=full to see details of leaked memory
==8155== 
==8155== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8155== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8157== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8157-by-pythonnut-on-???
==8157== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8157-by-pythonnut-on-???
==8157== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8157-by-pythonnut-on-???
==8157== 
==8157== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8157== don't want to do, unless you know exactly what you're doing,
==8157== or are doing some strange experiment):
==8157==   /usr/lib/valgrind/../../bin/vgdb --pid=8157 ...command...
==8157== 
==8157== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8157==   /path/to/gdb ./zsh
==8157== and then give GDB the following command
==8157==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8157
==8157== --pid is optional if only one valgrind process is running
==8157== 
--8157-- Caught __NR_exit; running __libc_freeres()
--8157-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8157== 
==8157== HEAP SUMMARY:
==8157==     in use at exit: 863,443 bytes in 21,801 blocks
==8157==   total heap usage: 153,088 allocs, 131,287 frees, 16,653,254 bytes allocated
==8157== 
==8157== Searching for pointers to 21,801 not-freed blocks
--8157--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8157--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8157--   Scanning root segment: 0x4022000..0x4047fff (155648)
--8157--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8157--   Scanning root segment: 0x41d6000..0x41fdfff (163840)
--8157--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8157--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8157--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8157--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8157--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8157--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8157--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8157--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8157--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8157--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8157--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8157--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8157--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8157--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8157--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8157--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8157--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8157--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8157--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8157--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8157--   Scanning root segment: 0x701a000..0x701afff (4096)
--8157--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8157== Checked 1,415,360 bytes
==8157== 
==8157== LEAK SUMMARY:
==8157==    definitely lost: 0 bytes in 0 blocks
==8157==    indirectly lost: 0 bytes in 0 blocks
==8157==      possibly lost: 0 bytes in 0 blocks
==8157==    still reachable: 863,443 bytes in 21,801 blocks
==8157==         suppressed: 0 bytes in 0 blocks
==8157== Rerun with --leak-check=full to see details of leaked memory
==8157== 
==8157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8158== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8158-by-pythonnut-on-???
==8158== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8158-by-pythonnut-on-???
==8158== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8158-by-pythonnut-on-???
==8158== 
==8158== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8158== don't want to do, unless you know exactly what you're doing,
==8158== or are doing some strange experiment):
==8158==   /usr/lib/valgrind/../../bin/vgdb --pid=8158 ...command...
==8158== 
==8158== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8158==   /path/to/gdb ./zsh
==8158== and then give GDB the following command
==8158==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8158
==8158== --pid is optional if only one valgrind process is running
==8158== 
--8158-- Caught __NR_exit; running __libc_freeres()
--8158-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8158== 
==8158== HEAP SUMMARY:
==8158==     in use at exit: 864,675 bytes in 21,852 blocks
==8158==   total heap usage: 153,090 allocs, 131,238 frees, 16,802,348 bytes allocated
==8158== 
==8158== Searching for pointers to 21,852 not-freed blocks
--8158--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8158--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8158--   Scanning root segment: 0x4022000..0x4047fff (155648)
--8158--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8158--   Scanning root segment: 0x41d6000..0x41fdfff (163840)
--8158--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8158--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8158--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8158--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8158--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8158--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8158--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8158--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8158--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8158--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8158--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8158--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8158--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8158--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8158--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8158--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8158--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8158--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8158--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8158--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8158--   Scanning root segment: 0x701a000..0x701afff (4096)
--8158--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8158== Checked 1,417,104 bytes
==8158== 
==8158== LEAK SUMMARY:
==8158==    definitely lost: 0 bytes in 0 blocks
==8158==    indirectly lost: 0 bytes in 0 blocks
==8158==      possibly lost: 0 bytes in 0 blocks
==8158==    still reachable: 864,675 bytes in 21,852 blocks
==8158==         suppressed: 0 bytes in 0 blocks
==8158== Rerun with --leak-check=full to see details of leaked memory
==8158== 
==8158== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8158== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8209== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8209-by-pythonnut-on-???
==8209== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8209-by-pythonnut-on-???
==8209== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8209-by-pythonnut-on-???
==8209== 
==8209== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8209== don't want to do, unless you know exactly what you're doing,
==8209== or are doing some strange experiment):
==8209==   /usr/lib/valgrind/../../bin/vgdb --pid=8209 ...command...
==8209== 
==8209== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8209==   /path/to/gdb ./zsh
==8209== and then give GDB the following command
==8209==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8209
==8209== --pid is optional if only one valgrind process is running
==8209== 
--8209-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8209== Ignoring duplicate redirection:
--8209--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8209--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--8209-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF32BC,  len 4
==8210== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8210-by-pythonnut-on-???
==8210== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8210-by-pythonnut-on-???
==8210== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8210-by-pythonnut-on-???
==8210== 
==8210== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8210== don't want to do, unless you know exactly what you're doing,
==8210== or are doing some strange experiment):
==8210==   /usr/lib/valgrind/../../bin/vgdb --pid=8210 ...command...
==8210== 
==8210== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8210==   /path/to/gdb ./zsh
==8210== and then give GDB the following command
==8210==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8210
==8210== --pid is optional if only one valgrind process is running
==8210== 
--8210-- Caught __NR_exit; running __libc_freeres()
--8210-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8210== 
==8210== HEAP SUMMARY:
==8210==     in use at exit: 879,508 bytes in 22,704 blocks
==8210==   total heap usage: 621,350 allocs, 598,646 frees, 26,661,890 bytes allocated
==8210== 
==8210== Searching for pointers to 22,704 not-freed blocks
--8210--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8210--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8210--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8210--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8210--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8210--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8210--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8210--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8210--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8210--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8210--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8210--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8210--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8210--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8210--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8210--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8210--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8210--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8210--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8210--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8210--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8210--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8210--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8210--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8210--   Scanning root segment: 0x701a000..0x701afff (4096)
--8210--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8210== Checked 1,134,104 bytes
==8210== 
==8210== LEAK SUMMARY:
==8210==    definitely lost: 0 bytes in 0 blocks
==8210==    indirectly lost: 0 bytes in 0 blocks
==8210==      possibly lost: 0 bytes in 0 blocks
==8210==    still reachable: 879,508 bytes in 22,704 blocks
==8210==         suppressed: 0 bytes in 0 blocks
==8210== Rerun with --leak-check=full to see details of leaked memory
==8210== 
==8210== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8210== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/complist.so
--7806--    svma 0x0000003850, avma 0x000a83e850
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/sched.so
--7806--    svma 0x0000000f70, avma 0x000aa4bf70
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/mathfunc.so
--7806--    svma 0x0000001fb0, avma 0x000ac4ffb0
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/terminfo.so
--7806--    svma 0x0000000e40, avma 0x000ae53e40
--8212-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8212== Ignoring duplicate redirection:
--8212--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8212--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--8212-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF30FC,  len 4
--8211-- Caught __NR_exit; running __libc_freeres()
==8211== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8211-by-pythonnut-on-???
==8211== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8211-by-pythonnut-on-???
==8211== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8211-by-pythonnut-on-???
==8211== 
==8211== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8211== don't want to do, unless you know exactly what you're doing,
==8211== or are doing some strange experiment):
==8211==   /usr/lib/valgrind/../../bin/vgdb --pid=8211 ...command...
==8211== 
==8211== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8211==   /path/to/gdb ./zsh
==8211== and then give GDB the following command
==8211==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8211
==8211== --pid is optional if only one valgrind process is running
==8211== 
--8211-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8211== 
==8211== HEAP SUMMARY:
==8211==     in use at exit: 718,129 bytes in 18,932 blocks
==8211==   total heap usage: 621,743 allocs, 602,811 frees, 26,759,404 bytes allocated
==8211== 
==8211== Searching for pointers to 18,932 not-freed blocks
--8211--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8211--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8211--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8211--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8211--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8211--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8211--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8211--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8211--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8211--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8211--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8211--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8211--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8211--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8211--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8211--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8211--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8211--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8211--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8211--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8211--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8211--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8211--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8211--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8211--   Scanning root segment: 0x701a000..0x701afff (4096)
--8211--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8211--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8211--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8211--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8211--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8211== Checked 1,005,584 bytes
==8211== 
==8211== LEAK SUMMARY:
==8211==    definitely lost: 0 bytes in 0 blocks
==8211==    indirectly lost: 0 bytes in 0 blocks
==8211==      possibly lost: 0 bytes in 0 blocks
==8211==    still reachable: 718,129 bytes in 18,932 blocks
==8211==         suppressed: 0 bytes in 0 blocks
==8211== Rerun with --leak-check=full to see details of leaked memory
==8211== 
==8211== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8211== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD7C,  len 4
client request: code 4d430005,  addr 0xFFEFFDFDC,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFD69C,  len 4
client request: code 4d430005,  addr 0xFFEFFD01C,  len 4
==8213== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8213-by-pythonnut-on-???
==8213== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8213-by-pythonnut-on-???
==8213== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8213-by-pythonnut-on-???
==8213== 
==8213== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8213== don't want to do, unless you know exactly what you're doing,
==8213== or are doing some strange experiment):
==8213==   /usr/lib/valgrind/../../bin/vgdb --pid=8213 ...command...
==8213== 
==8213== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8213==   /path/to/gdb ./zsh
==8213== and then give GDB the following command
==8213==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8213
==8213== --pid is optional if only one valgrind process is running
==8213== 
--8214-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8214== Ignoring duplicate redirection:
--8214--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8214--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--8214-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF47DC,  len 4
--8213-- Caught __NR_exit; running __libc_freeres()
--8213-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8213== 
==8213== HEAP SUMMARY:
==8213==     in use at exit: 719,784 bytes in 18,979 blocks
==8213==   total heap usage: 628,783 allocs, 609,804 frees, 27,045,303 bytes allocated
==8213== 
==8213== Searching for pointers to 18,979 not-freed blocks
--8213--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8213--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8213--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8213--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8213--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8213--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8213--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8213--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8213--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8213--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8213--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8213--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8213--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8213--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8213--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8213--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8213--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8213--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8213--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8213--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8213--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8213--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8213--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8213--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8213--   Scanning root segment: 0x701a000..0x701afff (4096)
--8213--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8213--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8213--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8213--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8213--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8213== Checked 998,600 bytes
==8213== 
==8213== LEAK SUMMARY:
==8213==    definitely lost: 208 bytes in 1 blocks
==8213==    indirectly lost: 6,756 bytes in 7 blocks
==8213==      possibly lost: 0 bytes in 0 blocks
==8213==    still reachable: 712,820 bytes in 18,971 blocks
==8213==         suppressed: 0 bytes in 0 blocks
==8213== Rerun with --leak-check=full to see details of leaked memory
==8213== 
==8213== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8213== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--7806-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
==8216== Ignoring duplicate redirection:
--8216--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8216--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005,  addr 0xFFEFF331C,  len 4
--8215-- Caught __NR_exit; running __libc_freeres()
==8215== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8215-by-pythonnut-on-???
==8215== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8215-by-pythonnut-on-???
==8215== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8215-by-pythonnut-on-???
==8215== 
==8215== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8215== don't want to do, unless you know exactly what you're doing,
==8215== or are doing some strange experiment):
==8215==   /usr/lib/valgrind/../../bin/vgdb --pid=8215 ...command...
==8215== 
==8215== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8215==   /path/to/gdb ./zsh
==8215== and then give GDB the following command
==8215==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8215
==8215== --pid is optional if only one valgrind process is running
==8215== 
--8215-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8215== 
==8215== HEAP SUMMARY:
==8215==     in use at exit: 749,767 bytes in 19,808 blocks
==8215==   total heap usage: 631,089 allocs, 611,281 frees, 27,558,234 bytes allocated
==8215== 
==8215== Searching for pointers to 19,808 not-freed blocks
--8215--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8215--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8215--   Scanning root segment: 0x4022000..0x402bfff (40960)
--8215--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8215--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8215--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8215--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8215--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8215--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8215--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8215--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8215--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8215--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8215--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8215--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8215--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8215--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8215--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8215--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8215--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8215--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8215--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8215--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8215--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8215--   Scanning root segment: 0x701a000..0x701afff (4096)
--8215--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8215--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8215--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8215--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8215--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8215== Checked 1,044,800 bytes
==8215== 
==8215== LEAK SUMMARY:
==8215==    definitely lost: 208 bytes in 1 blocks
==8215==    indirectly lost: 6,756 bytes in 7 blocks
==8215==      possibly lost: 0 bytes in 0 blocks
==8215==    still reachable: 742,803 bytes in 19,800 blocks
==8215==         suppressed: 0 bytes in 0 blocks
==8215== Rerun with --leak-check=full to see details of leaked memory
==8215== 
==8215== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8215== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFD2FC,  len 4
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005,  addr 0xFFEFF4EDC,  len 4
==8218== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8218-by-pythonnut-on-???
==8218== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8218-by-pythonnut-on-???
==8218== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8218-by-pythonnut-on-???
==8218== 
==8218== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8218== don't want to do, unless you know exactly what you're doing,
==8218== or are doing some strange experiment):
==8218==   /usr/lib/valgrind/../../bin/vgdb --pid=8218 ...command...
==8218== 
==8218== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8218==   /path/to/gdb ./zsh
==8218== and then give GDB the following command
==8218==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8218
==8218== --pid is optional if only one valgrind process is running
==8218== 
==8219== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8219-by-pythonnut-on-???
==8219== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8219-by-pythonnut-on-???
==8219== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8219-by-pythonnut-on-???
==8219== 
==8219== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8219== don't want to do, unless you know exactly what you're doing,
==8219== or are doing some strange experiment):
==8219==   /usr/lib/valgrind/../../bin/vgdb --pid=8219 ...command...
==8219== 
==8219== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8219==   /path/to/gdb ./zsh
==8219== and then give GDB the following command
==8219==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8219
==8219== --pid is optional if only one valgrind process is running
==8219== 
--8219-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1B4C,  len 4
--8219-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8219== 
==8219== HEAP SUMMARY:
==8219==     in use at exit: 767,979 bytes in 20,157 blocks
==8219==   total heap usage: 631,898 allocs, 611,741 frees, 27,681,728 bytes allocated
==8219== 
==8219== Searching for pointers to 20,157 not-freed blocks
--8219--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8219--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8219--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8219--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8219--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8219--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8219--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8219--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8219--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8219--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8219--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8219--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8219--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8219--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8219--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8219--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8219--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8219--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8219--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8219--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8219--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8219--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8219--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8219--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8219--   Scanning root segment: 0x701a000..0x701afff (4096)
--8219--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8219--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8219--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8219--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8219--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8219== Checked 1,048,304 bytes
==8219== 
==8219== LEAK SUMMARY:
==8219==    definitely lost: 208 bytes in 1 blocks
==8219==    indirectly lost: 6,756 bytes in 7 blocks
==8219==      possibly lost: 0 bytes in 0 blocks
==8219==    still reachable: 761,015 bytes in 20,149 blocks
==8219==         suppressed: 0 bytes in 0 blocks
==8219== Rerun with --leak-check=full to see details of leaked memory
==8219== 
==8219== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8219== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8218-- Caught __NR_exit; running __libc_freeres()
--8218-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8218== 
==8218== HEAP SUMMARY:
==8218==     in use at exit: 767,915 bytes in 20,154 blocks
==8218==   total heap usage: 631,899 allocs, 611,745 frees, 27,679,296 bytes allocated
==8218== 
==8218== Searching for pointers to 20,154 not-freed blocks
--8218--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8218--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8218--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8218--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8218--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8218--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8218--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8218--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8218--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8218--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8218--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8218--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8218--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8218--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8218--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8218--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8218--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8218--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8218--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8218--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8218--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8218--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8218--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8218--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8218--   Scanning root segment: 0x701a000..0x701afff (4096)
--8218--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8218--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8218--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8218--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8218--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8218== Checked 1,047,632 bytes
==8218== 
==8218== LEAK SUMMARY:
==8218==    definitely lost: 208 bytes in 1 blocks
==8218==    indirectly lost: 6,756 bytes in 7 blocks
==8218==      possibly lost: 0 bytes in 0 blocks
==8218==    still reachable: 760,951 bytes in 20,146 blocks
==8218==         suppressed: 0 bytes in 0 blocks
==8218== Rerun with --leak-check=full to see details of leaked memory
==8218== 
==8218== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8218== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8221== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8221-by-pythonnut-on-???
==8221== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8221-by-pythonnut-on-???
==8221== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8221-by-pythonnut-on-???
==8221== 
==8221== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8221== don't want to do, unless you know exactly what you're doing,
==8221== or are doing some strange experiment):
==8221==   /usr/lib/valgrind/../../bin/vgdb --pid=8221 ...command...
==8221== 
==8221== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8221==   /path/to/gdb ./zsh
==8221== and then give GDB the following command
==8221==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8221
==8221== --pid is optional if only one valgrind process is running
==8221== 
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
--8221-- Caught __NR_exit; running __libc_freeres()
--8221-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8221== 
==8221== HEAP SUMMARY:
==8221==     in use at exit: 795,488 bytes in 20,256 blocks
==8221==   total heap usage: 633,053 allocs, 612,797 frees, 27,910,165 bytes allocated
==8221== 
==8221== Searching for pointers to 20,256 not-freed blocks
--8221--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8221--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8221--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8221--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8221--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8221--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8221--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8221--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8221--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8221--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8221--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8221--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8221--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8221--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8221--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8221--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8221--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8221--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8221--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8221--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8221--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8221--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8221--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8221--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8221--   Scanning root segment: 0x701a000..0x701afff (4096)
--8221--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8221--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8221--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8221--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8221--   Scanning root segment: 0xffeff0000..0xfff000fff (69632)
==8221== Checked 1,080,656 bytes
==8221== 
==8221== LEAK SUMMARY:
==8221==    definitely lost: 208 bytes in 1 blocks
==8221==    indirectly lost: 6,756 bytes in 7 blocks
==8221==      possibly lost: 0 bytes in 0 blocks
==8221==    still reachable: 788,524 bytes in 20,248 blocks
==8221==         suppressed: 0 bytes in 0 blocks
==8221== Rerun with --leak-check=full to see details of leaked memory
==8221== 
==8221== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8221== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
--8223-- Caught __NR_exit; running __libc_freeres()
==8223== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8223-by-pythonnut-on-???
==8223== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8223-by-pythonnut-on-???
==8223== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8223-by-pythonnut-on-???
==8223== 
==8223== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8223== don't want to do, unless you know exactly what you're doing,
==8223== or are doing some strange experiment):
==8223==   /usr/lib/valgrind/../../bin/vgdb --pid=8223 ...command...
==8223== 
==8223== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8223==   /path/to/gdb ./zsh
==8223== and then give GDB the following command
==8223==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8223
==8223== --pid is optional if only one valgrind process is running
==8223== 
--8223-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8223== 
==8223== HEAP SUMMARY:
==8223==     in use at exit: 801,704 bytes in 20,404 blocks
==8223==   total heap usage: 633,358 allocs, 612,954 frees, 27,956,293 bytes allocated
==8223== 
==8223== Searching for pointers to 20,404 not-freed blocks
--8223--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8223--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8223--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8223--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8223--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8223--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8223--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8223--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8223--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8223--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8223--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8223--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8223--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8223--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8223--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8223--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8223--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8223--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8223--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8223--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8223--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8223--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8223--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8223--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8223--   Scanning root segment: 0x701a000..0x701afff (4096)
--8223--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8223--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8223--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8223--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8223--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8223== Checked 1,081,968 bytes
==8223== 
==8223== LEAK SUMMARY:
==8223==    definitely lost: 208 bytes in 1 blocks
==8223==    indirectly lost: 6,756 bytes in 7 blocks
==8223==      possibly lost: 0 bytes in 0 blocks
==8223==    still reachable: 794,740 bytes in 20,396 blocks
==8223==         suppressed: 0 bytes in 0 blocks
==8223== Rerun with --leak-check=full to see details of leaked memory
==8223== 
==8223== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8223== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/compctl.so
--7806--    svma 0x0000004520, avma 0x000b059520
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zleparameter.so
--7806--    svma 0x0000000c10, avma 0x000b269c10
==8224== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8224-by-pythonnut-on-???
==8224== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8224-by-pythonnut-on-???
==8224== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8224-by-pythonnut-on-???
==8224== 
==8224== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8224== don't want to do, unless you know exactly what you're doing,
==8224== or are doing some strange experiment):
==8224==   /usr/lib/valgrind/../../bin/vgdb --pid=8224 ...command...
==8224== 
==8224== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8224==   /path/to/gdb ./zsh
==8224== and then give GDB the following command
==8224==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8224
==8224== --pid is optional if only one valgrind process is running
==8224== 
--8224-- Caught __NR_exit; running __libc_freeres()
--8224-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8224== 
==8224== HEAP SUMMARY:
==8224==     in use at exit: 812,534 bytes in 20,451 blocks
==8224==   total heap usage: 633,776 allocs, 613,325 frees, 28,080,935 bytes allocated
==8224== 
==8224== Searching for pointers to 20,451 not-freed blocks
--8224--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8224--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8224--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8224--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8224--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8224--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8224--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8224--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8224--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8224--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8224--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8224--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8224--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8224--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8224--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8224--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8224--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8224--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8224--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8224--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8224--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8224--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8224--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8224--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8224--   Scanning root segment: 0x701a000..0x701afff (4096)
--8224--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8224--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8224--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8224--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8224--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8224--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8224--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8224== Checked 1,102,368 bytes
==8224== 
==8224== LEAK SUMMARY:
==8224==    definitely lost: 208 bytes in 1 blocks
==8224==    indirectly lost: 6,756 bytes in 7 blocks
==8224==      possibly lost: 0 bytes in 0 blocks
==8224==    still reachable: 805,570 bytes in 20,443 blocks
==8224==         suppressed: 0 bytes in 0 blocks
==8224== Rerun with --leak-check=full to see details of leaked memory
==8224== 
==8224== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8224== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005,  addr 0xFFEFF211C,  len 4
--8225-- Caught __NR_exit; running __libc_freeres()
==8225== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8225-by-pythonnut-on-???
==8225== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8225-by-pythonnut-on-???
==8225== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8225-by-pythonnut-on-???
==8225== 
==8225== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8225== don't want to do, unless you know exactly what you're doing,
==8225== or are doing some strange experiment):
==8225==   /usr/lib/valgrind/../../bin/vgdb --pid=8225 ...command...
==8225== 
==8225== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8225==   /path/to/gdb ./zsh
==8225== and then give GDB the following command
==8225==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8225
==8225== --pid is optional if only one valgrind process is running
==8225== 
--8225-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8225== 
==8225== HEAP SUMMARY:
==8225==     in use at exit: 915,268 bytes in 22,030 blocks
==8225==   total heap usage: 640,170 allocs, 618,140 frees, 29,935,089 bytes allocated
==8225== 
==8225== Searching for pointers to 22,030 not-freed blocks
--8225--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8225--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8225--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8225--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8225--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8225--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8225--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8225--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8225--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8225--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8225--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8225--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8225--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8225--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8225--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8225--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8225--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8225--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8225--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8225--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8225--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8225--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8225--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8225--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8225--   Scanning root segment: 0x701a000..0x701afff (4096)
--8225--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8225--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8225--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8225--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8225--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8225--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8225--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8225== Checked 1,195,632 bytes
==8225== 
==8225== LEAK SUMMARY:
==8225==    definitely lost: 232 bytes in 2 blocks
==8225==    indirectly lost: 6,811 bytes in 10 blocks
==8225==      possibly lost: 0 bytes in 0 blocks
==8225==    still reachable: 908,225 bytes in 22,018 blocks
==8225==         suppressed: 0 bytes in 0 blocks
==8225== Rerun with --leak-check=full to see details of leaked memory
==8225== 
==8225== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8225== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8228== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8228-by-pythonnut-on-???
==8228== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8228-by-pythonnut-on-???
==8228== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8228-by-pythonnut-on-???
==8228== 
==8228== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8228== don't want to do, unless you know exactly what you're doing,
==8228== or are doing some strange experiment):
==8228==   /usr/lib/valgrind/../../bin/vgdb --pid=8228 ...command...
==8228== 
==8228== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8228==   /path/to/gdb ./zsh
==8228== and then give GDB the following command
==8228==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8228
==8228== --pid is optional if only one valgrind process is running
==8228== 
client request: code 4d430005,  addr 0xFFEFF211C,  len 4
==8227== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8227-by-pythonnut-on-???
==8227== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8227-by-pythonnut-on-???
==8227== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8227-by-pythonnut-on-???
==8227== 
==8227== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8227== don't want to do, unless you know exactly what you're doing,
==8227== or are doing some strange experiment):
==8227==   /usr/lib/valgrind/../../bin/vgdb --pid=8227 ...command...
==8227== 
==8227== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8227==   /path/to/gdb ./zsh
==8227== and then give GDB the following command
==8227==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8227
==8227== --pid is optional if only one valgrind process is running
==8227== 
--8227-- Caught __NR_exit; running __libc_freeres()
--8227-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8227== 
==8227== HEAP SUMMARY:
==8227==     in use at exit: 916,266 bytes in 22,042 blocks
==8227==   total heap usage: 640,230 allocs, 618,188 frees, 29,947,079 bytes allocated
==8227== 
==8227== Searching for pointers to 22,042 not-freed blocks
--8227--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8227--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8227--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8227--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8227--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8227--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8227--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8227--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8227--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8227--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8227--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8227--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8227--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8227--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8227--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8227--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8227--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8227--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8227--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8227--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8227--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8227--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8227--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8227--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8227--   Scanning root segment: 0x701a000..0x701afff (4096)
--8227--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8227--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8227--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8227--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8227--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8227--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8227--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8227== Checked 1,196,536 bytes
==8227== 
==8227== LEAK SUMMARY:
==8227==    definitely lost: 247 bytes in 3 blocks
==8227==    indirectly lost: 6,811 bytes in 10 blocks
==8227==      possibly lost: 0 bytes in 0 blocks
==8227==    still reachable: 909,208 bytes in 22,029 blocks
==8227==         suppressed: 0 bytes in 0 blocks
==8227== Rerun with --leak-check=full to see details of leaked memory
==8227== 
==8227== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8227== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8230== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8230-by-pythonnut-on-???
==8230== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8230-by-pythonnut-on-???
==8230== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8230-by-pythonnut-on-???
==8230== 
==8230== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8230== don't want to do, unless you know exactly what you're doing,
==8230== or are doing some strange experiment):
==8230==   /usr/lib/valgrind/../../bin/vgdb --pid=8230 ...command...
==8230== 
==8230== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8230==   /path/to/gdb ./zsh
==8230== and then give GDB the following command
==8230==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8230
==8230== --pid is optional if only one valgrind process is running
==8230== 
client request: code 4d430005,  addr 0xFFEFF211C,  len 4
--8229-- Caught __NR_exit; running __libc_freeres()
==8229== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8229-by-pythonnut-on-???
==8229== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8229-by-pythonnut-on-???
==8229== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8229-by-pythonnut-on-???
==8229== 
==8229== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8229== don't want to do, unless you know exactly what you're doing,
==8229== or are doing some strange experiment):
==8229==   /usr/lib/valgrind/../../bin/vgdb --pid=8229 ...command...
==8229== 
==8229== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8229==   /path/to/gdb ./zsh
==8229== and then give GDB the following command
==8229==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8229
==8229== --pid is optional if only one valgrind process is running
==8229== 
--8229-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8229== 
==8229== HEAP SUMMARY:
==8229==     in use at exit: 917,159 bytes in 22,053 blocks
==8229==   total heap usage: 640,290 allocs, 618,237 frees, 29,959,130 bytes allocated
==8229== 
==8229== Searching for pointers to 22,053 not-freed blocks
--8229--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8229--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8229--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8229--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8229--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8229--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8229--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8229--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8229--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8229--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8229--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8229--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8229--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8229--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8229--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8229--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8229--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8229--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8229--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8229--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8229--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8229--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8229--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8229--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8229--   Scanning root segment: 0x701a000..0x701afff (4096)
--8229--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8229--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8229--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8229--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8229--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8229--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8229--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8229== Checked 1,197,368 bytes
==8229== 
==8229== LEAK SUMMARY:
==8229==    definitely lost: 262 bytes in 4 blocks
==8229==    indirectly lost: 6,811 bytes in 10 blocks
==8229==      possibly lost: 0 bytes in 0 blocks
==8229==    still reachable: 910,086 bytes in 22,039 blocks
==8229==         suppressed: 0 bytes in 0 blocks
==8229== Rerun with --leak-check=full to see details of leaked memory
==8229== 
==8229== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8229== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8232== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8232-by-pythonnut-on-???
==8232== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8232-by-pythonnut-on-???
==8232== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8232-by-pythonnut-on-???
==8232== 
==8232== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8232== don't want to do, unless you know exactly what you're doing,
==8232== or are doing some strange experiment):
==8232==   /usr/lib/valgrind/../../bin/vgdb --pid=8232 ...command...
==8232== 
==8232== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8232==   /path/to/gdb ./zsh
==8232== and then give GDB the following command
==8232==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8232
==8232== --pid is optional if only one valgrind process is running
==8232== 
client request: code 4d430005,  addr 0xFFEFF2C1C,  len 4
--8231-- Caught __NR_exit; running __libc_freeres()
==8231== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8231-by-pythonnut-on-???
==8231== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8231-by-pythonnut-on-???
==8231== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8231-by-pythonnut-on-???
==8231== 
==8231== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8231== don't want to do, unless you know exactly what you're doing,
==8231== or are doing some strange experiment):
==8231==   /usr/lib/valgrind/../../bin/vgdb --pid=8231 ...command...
==8231== 
==8231== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8231==   /path/to/gdb ./zsh
==8231== and then give GDB the following command
==8231==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8231
==8231== --pid is optional if only one valgrind process is running
==8231== 
--8231-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8231== 
==8231== HEAP SUMMARY:
==8231==     in use at exit: 928,525 bytes in 22,140 blocks
==8231==   total heap usage: 640,572 allocs, 618,432 frees, 30,014,567 bytes allocated
==8231== 
==8231== Searching for pointers to 22,140 not-freed blocks
--8231--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8231--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8231--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8231--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8231--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8231--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8231--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8231--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8231--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8231--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8231--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8231--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8231--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8231--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8231--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8231--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8231--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8231--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8231--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8231--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8231--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8231--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8231--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8231--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8231--   Scanning root segment: 0x701a000..0x701afff (4096)
--8231--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8231--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8231--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8231--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8231--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8231--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8231--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8231== Checked 1,207,704 bytes
==8231== 
==8231== LEAK SUMMARY:
==8231==    definitely lost: 253 bytes in 4 blocks
==8231==    indirectly lost: 6,756 bytes in 7 blocks
==8231==      possibly lost: 0 bytes in 0 blocks
==8231==    still reachable: 921,516 bytes in 22,129 blocks
==8231==         suppressed: 0 bytes in 0 blocks
==8231== Rerun with --leak-check=full to see details of leaked memory
==8231== 
==8231== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8231== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8234== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8234-by-pythonnut-on-???
==8234== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8234-by-pythonnut-on-???
==8234== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8234-by-pythonnut-on-???
==8234== 
==8234== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8234== don't want to do, unless you know exactly what you're doing,
==8234== or are doing some strange experiment):
==8234==   /usr/lib/valgrind/../../bin/vgdb --pid=8234 ...command...
==8234== 
==8234== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8234==   /path/to/gdb ./zsh
==8234== and then give GDB the following command
==8234==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8234
==8234== --pid is optional if only one valgrind process is running
==8234== 
client request: code 4d430005,  addr 0xFFEFF2C1C,  len 4
==8233== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8233-by-pythonnut-on-???
==8233== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8233-by-pythonnut-on-???
==8233== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8233-by-pythonnut-on-???
==8233== 
==8233== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8233== don't want to do, unless you know exactly what you're doing,
==8233== or are doing some strange experiment):
==8233==   /usr/lib/valgrind/../../bin/vgdb --pid=8233 ...command...
==8233== 
==8233== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8233==   /path/to/gdb ./zsh
==8233== and then give GDB the following command
==8233==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8233
==8233== --pid is optional if only one valgrind process is running
==8233== 
--8233-- Caught __NR_exit; running __libc_freeres()
--8233-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8233== 
==8233== HEAP SUMMARY:
==8233==     in use at exit: 962,024 bytes in 22,425 blocks
==8233==   total heap usage: 641,708 allocs, 619,283 frees, 30,204,805 bytes allocated
==8233== 
==8233== Searching for pointers to 22,425 not-freed blocks
--8233--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8233--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8233--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8233--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8233--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8233--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8233--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8233--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8233--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8233--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8233--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8233--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8233--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8233--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8233--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8233--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8233--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8233--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8233--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8233--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8233--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8233--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8233--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8233--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8233--   Scanning root segment: 0x701a000..0x701afff (4096)
--8233--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8233--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8233--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8233--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8233--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8233--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8233--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8233== Checked 1,240,176 bytes
==8233== 
==8233== LEAK SUMMARY:
==8233==    definitely lost: 253 bytes in 4 blocks
==8233==    indirectly lost: 6,756 bytes in 7 blocks
==8233==      possibly lost: 0 bytes in 0 blocks
==8233==    still reachable: 955,015 bytes in 22,414 blocks
==8233==         suppressed: 0 bytes in 0 blocks
==8233== Rerun with --leak-check=full to see details of leaked memory
==8233== 
==8233== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8233== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8236== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8236-by-pythonnut-on-???
==8236== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8236-by-pythonnut-on-???
==8236== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8236-by-pythonnut-on-???
==8236== 
==8236== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8236== don't want to do, unless you know exactly what you're doing,
==8236== or are doing some strange experiment):
==8236==   /usr/lib/valgrind/../../bin/vgdb --pid=8236 ...command...
==8236== 
==8236== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8236==   /path/to/gdb ./zsh
==8236== and then give GDB the following command
==8236==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8236
==8236== --pid is optional if only one valgrind process is running
==8236== 
client request: code 4d430005,  addr 0xFFEFF2C1C,  len 4
==8235== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8235-by-pythonnut-on-???
==8235== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8235-by-pythonnut-on-???
==8235== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8235-by-pythonnut-on-???
==8235== 
==8235== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8235== don't want to do, unless you know exactly what you're doing,
==8235== or are doing some strange experiment):
==8235==   /usr/lib/valgrind/../../bin/vgdb --pid=8235 ...command...
==8235== 
==8235== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8235==   /path/to/gdb ./zsh
==8235== and then give GDB the following command
==8235==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8235
==8235== --pid is optional if only one valgrind process is running
==8235== 
--8235-- Caught __NR_exit; running __libc_freeres()
--8235-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8235== 
==8235== HEAP SUMMARY:
==8235==     in use at exit: 962,495 bytes in 22,430 blocks
==8235==   total heap usage: 641,757 allocs, 619,327 frees, 30,213,406 bytes allocated
==8235== 
==8235== Searching for pointers to 22,430 not-freed blocks
--8235--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8235--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8235--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8235--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8235--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8235--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8235--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8235--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8235--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8235--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8235--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8235--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8235--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8235--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8235--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8235--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8235--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8235--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8235--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8235--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8235--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8235--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8235--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8235--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8235--   Scanning root segment: 0x701a000..0x701afff (4096)
--8235--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8235--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8235--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8235--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8235--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8235--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8235--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8235== Checked 1,240,608 bytes
==8235== 
==8235== LEAK SUMMARY:
==8235==    definitely lost: 253 bytes in 4 blocks
==8235==    indirectly lost: 6,756 bytes in 7 blocks
==8235==      possibly lost: 0 bytes in 0 blocks
==8235==    still reachable: 955,486 bytes in 22,419 blocks
==8235==         suppressed: 0 bytes in 0 blocks
==8235== Rerun with --leak-check=full to see details of leaked memory
==8235== 
==8235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8237-- Caught __NR_exit; running __libc_freeres()
==8237== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8237-by-pythonnut-on-???
==8237== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8237-by-pythonnut-on-???
==8237== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8237-by-pythonnut-on-???
==8237== 
==8237== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8237== don't want to do, unless you know exactly what you're doing,
==8237== or are doing some strange experiment):
==8237==   /usr/lib/valgrind/../../bin/vgdb --pid=8237 ...command...
==8237== 
==8237== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8237==   /path/to/gdb ./zsh
==8237== and then give GDB the following command
==8237==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8237
==8237== --pid is optional if only one valgrind process is running
==8237== 
--8237-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8237== 
==8237== HEAP SUMMARY:
==8237==     in use at exit: 1,020,245 bytes in 23,340 blocks
==8237==   total heap usage: 645,597 allocs, 622,257 frees, 30,544,478 bytes allocated
==8237== 
==8237== Searching for pointers to 23,340 not-freed blocks
--8237--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8237--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8237--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8237--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8237--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8237--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8237--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8237--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8237--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8237--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8237--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8237--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8237--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8237--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8237--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8237--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8237--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8237--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8237--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8237--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8237--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8237--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8237--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8237--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8237--   Scanning root segment: 0x701a000..0x701afff (4096)
--8237--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8237--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8237--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8237--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8237--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8237--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8237--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8237== Checked 1,302,272 bytes
==8237== 
==8237== LEAK SUMMARY:
==8237==    definitely lost: 253 bytes in 4 blocks
==8237==    indirectly lost: 6,756 bytes in 7 blocks
==8237==      possibly lost: 0 bytes in 0 blocks
==8237==    still reachable: 1,013,236 bytes in 23,329 blocks
==8237==         suppressed: 0 bytes in 0 blocks
==8237== Rerun with --leak-check=full to see details of leaked memory
==8237== 
==8237== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8237== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8238== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8238-by-pythonnut-on-???
==8238== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8238-by-pythonnut-on-???
==8238== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8238-by-pythonnut-on-???
==8238== 
==8238== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8238== don't want to do, unless you know exactly what you're doing,
==8238== or are doing some strange experiment):
==8238==   /usr/lib/valgrind/../../bin/vgdb --pid=8238 ...command...
==8238== 
==8238== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8238==   /path/to/gdb ./zsh
==8238== and then give GDB the following command
==8238==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8238
==8238== --pid is optional if only one valgrind process is running
==8238== 
--8238-- Caught __NR_exit; running __libc_freeres()
--8238-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8238== 
==8238== HEAP SUMMARY:
==8238==     in use at exit: 1,020,615 bytes in 23,345 blocks
==8238==   total heap usage: 645,622 allocs, 622,277 frees, 30,550,850 bytes allocated
==8238== 
==8238== Searching for pointers to 23,345 not-freed blocks
--8238--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8238--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8238--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8238--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8238--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8238--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8238--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8238--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8238--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8238--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8238--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8238--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8238--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8238--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8238--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8238--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8238--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8238--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8238--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8238--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8238--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8238--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8238--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8238--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8238--   Scanning root segment: 0x701a000..0x701afff (4096)
--8238--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8238--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8238--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8238--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8238--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8238--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8238--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8238== Checked 1,302,624 bytes
==8238== 
==8238== LEAK SUMMARY:
==8238==    definitely lost: 253 bytes in 4 blocks
==8238==    indirectly lost: 6,756 bytes in 7 blocks
==8238==      possibly lost: 0 bytes in 0 blocks
==8238==    still reachable: 1,013,606 bytes in 23,334 blocks
==8238==         suppressed: 0 bytes in 0 blocks
==8238== Rerun with --leak-check=full to see details of leaked memory
==8238== 
==8238== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8238== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8239-- Caught __NR_exit; running __libc_freeres()
==8239== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8239-by-pythonnut-on-???
==8239== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8239-by-pythonnut-on-???
==8239== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8239-by-pythonnut-on-???
==8239== 
==8239== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8239== don't want to do, unless you know exactly what you're doing,
==8239== or are doing some strange experiment):
==8239==   /usr/lib/valgrind/../../bin/vgdb --pid=8239 ...command...
==8239== 
==8239== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8239==   /path/to/gdb ./zsh
==8239== and then give GDB the following command
==8239==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8239
==8239== --pid is optional if only one valgrind process is running
==8239== 
--8239-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8239== 
==8239== HEAP SUMMARY:
==8239==     in use at exit: 1,021,010 bytes in 23,350 blocks
==8239==   total heap usage: 645,647 allocs, 622,297 frees, 30,557,329 bytes allocated
==8239== 
==8239== Searching for pointers to 23,350 not-freed blocks
--8239--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8239--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8239--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8239--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8239--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8239--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8239--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8239--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8239--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8239--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8239--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8239--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8239--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8239--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8239--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8239--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8239--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8239--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8239--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8239--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8239--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8239--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8239--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8239--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8239--   Scanning root segment: 0x701a000..0x701afff (4096)
--8239--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8239--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8239--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8239--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8239--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8239--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8239--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8239== Checked 1,302,160 bytes
==8239== 
==8239== LEAK SUMMARY:
==8239==    definitely lost: 253 bytes in 4 blocks
==8239==    indirectly lost: 6,756 bytes in 7 blocks
==8239==      possibly lost: 0 bytes in 0 blocks
==8239==    still reachable: 1,014,001 bytes in 23,339 blocks
==8239==         suppressed: 0 bytes in 0 blocks
==8239== Rerun with --leak-check=full to see details of leaked memory
==8239== 
==8239== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8239== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8240-- Caught __NR_exit; running __libc_freeres()
==8240== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8240-by-pythonnut-on-???
==8240== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8240-by-pythonnut-on-???
==8240== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8240-by-pythonnut-on-???
==8240== 
==8240== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8240== don't want to do, unless you know exactly what you're doing,
==8240== or are doing some strange experiment):
==8240==   /usr/lib/valgrind/../../bin/vgdb --pid=8240 ...command...
==8240== 
==8240== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8240==   /path/to/gdb ./zsh
==8240== and then give GDB the following command
==8240==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8240
==8240== --pid is optional if only one valgrind process is running
==8240== 
--8240-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8240== 
==8240== HEAP SUMMARY:
==8240==     in use at exit: 1,021,390 bytes in 23,355 blocks
==8240==   total heap usage: 645,672 allocs, 622,317 frees, 30,563,757 bytes allocated
==8240== 
==8240== Searching for pointers to 23,355 not-freed blocks
--8240--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8240--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8240--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8240--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8240--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8240--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8240--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8240--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8240--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8240--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8240--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8240--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8240--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8240--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8240--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8240--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8240--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8240--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8240--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8240--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8240--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8240--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8240--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8240--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8240--   Scanning root segment: 0x701a000..0x701afff (4096)
--8240--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8240--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8240--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8240--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8240--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8240--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8240--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8240== Checked 1,302,520 bytes
==8240== 
==8240== LEAK SUMMARY:
==8240==    definitely lost: 253 bytes in 4 blocks
==8240==    indirectly lost: 6,756 bytes in 7 blocks
==8240==      possibly lost: 0 bytes in 0 blocks
==8240==    still reachable: 1,014,381 bytes in 23,344 blocks
==8240==         suppressed: 0 bytes in 0 blocks
==8240== Rerun with --leak-check=full to see details of leaked memory
==8240== 
==8240== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8240== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8241-- Caught __NR_exit; running __libc_freeres()
==8241== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8241-by-pythonnut-on-???
==8241== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8241-by-pythonnut-on-???
==8241== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8241-by-pythonnut-on-???
==8241== 
==8241== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8241== don't want to do, unless you know exactly what you're doing,
==8241== or are doing some strange experiment):
==8241==   /usr/lib/valgrind/../../bin/vgdb --pid=8241 ...command...
==8241== 
==8241== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8241==   /path/to/gdb ./zsh
==8241== and then give GDB the following command
==8241==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8241
==8241== --pid is optional if only one valgrind process is running
==8241== 
--8241-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8241== 
==8241== HEAP SUMMARY:
==8241==     in use at exit: 1,021,749 bytes in 23,360 blocks
==8241==   total heap usage: 645,697 allocs, 622,337 frees, 30,570,114 bytes allocated
==8241== 
==8241== Searching for pointers to 23,360 not-freed blocks
--8241--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8241--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8241--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8241--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8241--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8241--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8241--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8241--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8241--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8241--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8241--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8241--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8241--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8241--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8241--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8241--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8241--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8241--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8241--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8241--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8241--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8241--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8241--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8241--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8241--   Scanning root segment: 0x701a000..0x701afff (4096)
--8241--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8241--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8241--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8241--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8241--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8241--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8241--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8241== Checked 1,302,864 bytes
==8241== 
==8241== LEAK SUMMARY:
==8241==    definitely lost: 253 bytes in 4 blocks
==8241==    indirectly lost: 6,756 bytes in 7 blocks
==8241==      possibly lost: 0 bytes in 0 blocks
==8241==    still reachable: 1,014,740 bytes in 23,349 blocks
==8241==         suppressed: 0 bytes in 0 blocks
==8241== Rerun with --leak-check=full to see details of leaked memory
==8241== 
==8241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8242-- Caught __NR_exit; running __libc_freeres()
==8242== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8242-by-pythonnut-on-???
==8242== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8242-by-pythonnut-on-???
==8242== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8242-by-pythonnut-on-???
==8242== 
==8242== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8242== don't want to do, unless you know exactly what you're doing,
==8242== or are doing some strange experiment):
==8242==   /usr/lib/valgrind/../../bin/vgdb --pid=8242 ...command...
==8242== 
==8242== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8242==   /path/to/gdb ./zsh
==8242== and then give GDB the following command
==8242==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8242
==8242== --pid is optional if only one valgrind process is running
==8242== 
--8242-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8242== 
==8242== HEAP SUMMARY:
==8242==     in use at exit: 1,022,120 bytes in 23,365 blocks
==8242==   total heap usage: 645,722 allocs, 622,357 frees, 30,576,527 bytes allocated
==8242== 
==8242== Searching for pointers to 23,365 not-freed blocks
--8242--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8242--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8242--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8242--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8242--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8242--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8242--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8242--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8242--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8242--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8242--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8242--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8242--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8242--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8242--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8242--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8242--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8242--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8242--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8242--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8242--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8242--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8242--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8242--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8242--   Scanning root segment: 0x701a000..0x701afff (4096)
--8242--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8242--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8242--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8242--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8242--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8242--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8242--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8242== Checked 1,303,216 bytes
==8242== 
==8242== LEAK SUMMARY:
==8242==    definitely lost: 253 bytes in 4 blocks
==8242==    indirectly lost: 6,756 bytes in 7 blocks
==8242==      possibly lost: 0 bytes in 0 blocks
==8242==    still reachable: 1,015,111 bytes in 23,354 blocks
==8242==         suppressed: 0 bytes in 0 blocks
==8242== Rerun with --leak-check=full to see details of leaked memory
==8242== 
==8242== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8242== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8243== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8243-by-pythonnut-on-???
==8243== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8243-by-pythonnut-on-???
==8243== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8243-by-pythonnut-on-???
==8243== 
==8243== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8243== don't want to do, unless you know exactly what you're doing,
==8243== or are doing some strange experiment):
==8243==   /usr/lib/valgrind/../../bin/vgdb --pid=8243 ...command...
==8243== 
==8243== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8243==   /path/to/gdb ./zsh
==8243== and then give GDB the following command
==8243==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8243
==8243== --pid is optional if only one valgrind process is running
==8243== 
--8243-- Caught __NR_exit; running __libc_freeres()
--8243-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8243== 
==8243== HEAP SUMMARY:
==8243==     in use at exit: 1,022,475 bytes in 23,370 blocks
==8243==   total heap usage: 645,747 allocs, 622,377 frees, 30,582,880 bytes allocated
==8243== 
==8243== Searching for pointers to 23,370 not-freed blocks
--8243--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8243--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8243--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8243--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8243--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8243--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8243--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8243--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8243--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8243--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8243--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8243--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8243--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8243--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8243--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8243--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8243--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8243--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8243--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8243--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8243--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8243--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8243--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8243--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8243--   Scanning root segment: 0x701a000..0x701afff (4096)
--8243--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8243--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8243--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8243--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8243--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8243--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8243--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8243== Checked 1,303,552 bytes
==8243== 
==8243== LEAK SUMMARY:
==8243==    definitely lost: 253 bytes in 4 blocks
==8243==    indirectly lost: 6,756 bytes in 7 blocks
==8243==      possibly lost: 0 bytes in 0 blocks
==8243==    still reachable: 1,015,466 bytes in 23,359 blocks
==8243==         suppressed: 0 bytes in 0 blocks
==8243== Rerun with --leak-check=full to see details of leaked memory
==8243== 
==8243== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8243== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8244== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8244-by-pythonnut-on-???
==8244== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8244-by-pythonnut-on-???
==8244== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8244-by-pythonnut-on-???
==8244== 
==8244== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8244== don't want to do, unless you know exactly what you're doing,
==8244== or are doing some strange experiment):
==8244==   /usr/lib/valgrind/../../bin/vgdb --pid=8244 ...command...
==8244== 
==8244== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8244==   /path/to/gdb ./zsh
==8244== and then give GDB the following command
==8244==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8244
==8244== --pid is optional if only one valgrind process is running
==8244== 
--8244-- Caught __NR_exit; running __libc_freeres()
--8244-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8244== 
==8244== HEAP SUMMARY:
==8244==     in use at exit: 1,022,829 bytes in 23,375 blocks
==8244==   total heap usage: 645,772 allocs, 622,397 frees, 30,589,236 bytes allocated
==8244== 
==8244== Searching for pointers to 23,375 not-freed blocks
--8244--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8244--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8244--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8244--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8244--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8244--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8244--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8244--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8244--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8244--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8244--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8244--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8244--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8244--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8244--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8244--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8244--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8244--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8244--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8244--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8244--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8244--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8244--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8244--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8244--   Scanning root segment: 0x701a000..0x701afff (4096)
--8244--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8244--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8244--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8244--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8244--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8244--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8244--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8244== Checked 1,303,888 bytes
==8244== 
==8244== LEAK SUMMARY:
==8244==    definitely lost: 253 bytes in 4 blocks
==8244==    indirectly lost: 6,756 bytes in 7 blocks
==8244==      possibly lost: 0 bytes in 0 blocks
==8244==    still reachable: 1,015,820 bytes in 23,364 blocks
==8244==         suppressed: 0 bytes in 0 blocks
==8244== Rerun with --leak-check=full to see details of leaked memory
==8244== 
==8244== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8244== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8245== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8245-by-pythonnut-on-???
==8245== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8245-by-pythonnut-on-???
==8245== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8245-by-pythonnut-on-???
==8245== 
==8245== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8245== don't want to do, unless you know exactly what you're doing,
==8245== or are doing some strange experiment):
==8245==   /usr/lib/valgrind/../../bin/vgdb --pid=8245 ...command...
==8245== 
==8245== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8245==   /path/to/gdb ./zsh
==8245== and then give GDB the following command
==8245==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8245
==8245== --pid is optional if only one valgrind process is running
==8245== 
--8245-- Caught __NR_exit; running __libc_freeres()
--8245-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8245== 
==8245== HEAP SUMMARY:
==8245==     in use at exit: 1,022,166 bytes in 23,346 blocks
==8245==   total heap usage: 645,880 allocs, 622,534 frees, 30,596,379 bytes allocated
==8245== 
==8245== Searching for pointers to 23,346 not-freed blocks
--8245--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8245--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8245--   Scanning root segment: 0x4022000..0x402cfff (45056)
--8245--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8245--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8245--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8245--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8245--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8245--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8245--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8245--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8245--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8245--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8245--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8245--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8245--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8245--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8245--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8245--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8245--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8245--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8245--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8245--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8245--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8245--   Scanning root segment: 0x701a000..0x701afff (4096)
--8245--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8245--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8245--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8245--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8245--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8245--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8245--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8245== Checked 1,317,568 bytes
==8245== 
==8245== LEAK SUMMARY:
==8245==    definitely lost: 253 bytes in 4 blocks
==8245==    indirectly lost: 6,756 bytes in 7 blocks
==8245==      possibly lost: 0 bytes in 0 blocks
==8245==    still reachable: 1,015,157 bytes in 23,335 blocks
==8245==         suppressed: 0 bytes in 0 blocks
==8245== Rerun with --leak-check=full to see details of leaked memory
==8245== 
==8245== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8245== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8246-- Caught __NR_exit; running __libc_freeres()
==8246== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8246-by-pythonnut-on-???
==8246== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8246-by-pythonnut-on-???
==8246== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8246-by-pythonnut-on-???
==8246== 
==8246== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8246== don't want to do, unless you know exactly what you're doing,
==8246== or are doing some strange experiment):
==8246==   /usr/lib/valgrind/../../bin/vgdb --pid=8246 ...command...
==8246== 
==8246== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8246==   /path/to/gdb ./zsh
==8246== and then give GDB the following command
==8246==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8246
==8246== --pid is optional if only one valgrind process is running
==8246== 
--8246-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8246== 
==8246== HEAP SUMMARY:
==8246==     in use at exit: 1,022,143 bytes in 23,346 blocks
==8246==   total heap usage: 645,835 allocs, 622,489 frees, 30,597,901 bytes allocated
==8246== 
==8246== Searching for pointers to 23,346 not-freed blocks
--8246--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8246--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8246--   Scanning root segment: 0x4022000..0x402cfff (45056)
--8246--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8246--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8246--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8246--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8246--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8246--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8246--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8246--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8246--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8246--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8246--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8246--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8246--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8246--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8246--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8246--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8246--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8246--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8246--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8246--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8246--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8246--   Scanning root segment: 0x701a000..0x701afff (4096)
--8246--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8246--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8246--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8246--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8246--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8246--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8246--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8246== Checked 1,317,576 bytes
==8246== 
==8246== LEAK SUMMARY:
==8246==    definitely lost: 253 bytes in 4 blocks
==8246==    indirectly lost: 6,756 bytes in 7 blocks
==8246==      possibly lost: 0 bytes in 0 blocks
==8246==    still reachable: 1,015,134 bytes in 23,335 blocks
==8246==         suppressed: 0 bytes in 0 blocks
==8246== Rerun with --leak-check=full to see details of leaked memory
==8246== 
==8246== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8246== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430100,  addr 0x4C31E1E,  len 67288356
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806==    by 0x488CD0: stringsubst (subst.c:301)
==7806==    by 0x48801B: prefork (subst.c:77)
==7806==    by 0x42B318: execcmd (exec.c:2619)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x427756: execlist (exec.c:1267)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x4302FB: execshfunc (exec.c:4557)
==7806==    by 0x42D8C1: execcmd (exec.c:3373)
==7806== 
==8247== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8247-by-pythonnut-on-???
==8247== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8247-by-pythonnut-on-???
==8247== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8247-by-pythonnut-on-???
==8247== 
==8247== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8247== don't want to do, unless you know exactly what you're doing,
==8247== or are doing some strange experiment):
==8247==   /usr/lib/valgrind/../../bin/vgdb --pid=8247 ...command...
==8247== 
==8247== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8247==   /path/to/gdb ./zsh
==8247== and then give GDB the following command
==8247==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8247
==8247== --pid is optional if only one valgrind process is running
==8247== 
--8247-- Caught __NR_exit; running __libc_freeres()
--8247-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8247== 
==8247== HEAP SUMMARY:
==8247==     in use at exit: 1,049,587 bytes in 23,943 blocks
==8247==   total heap usage: 648,207 allocs, 624,264 frees, 30,758,770 bytes allocated
==8247== 
==8247== Searching for pointers to 23,943 not-freed blocks
--8247--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8247--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8247--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8247--   Scanning root segment: 0x402a000..0x402efff (20480)
--8247--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8247--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8247--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8247--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8247--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8247--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8247--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8247--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8247--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8247--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8247--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8247--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8247--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8247--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8247--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8247--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8247--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8247--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8247--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8247--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8247--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8247--   Scanning root segment: 0x701a000..0x701afff (4096)
--8247--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8247--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8247--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8247--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8247--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8247--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8247--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8247== Checked 1,339,768 bytes
==8247== 
==8247== LEAK SUMMARY:
==8247==    definitely lost: 253 bytes in 4 blocks
==8247==    indirectly lost: 6,756 bytes in 7 blocks
==8247==      possibly lost: 0 bytes in 0 blocks
==8247==    still reachable: 1,042,578 bytes in 23,932 blocks
==8247==         suppressed: 0 bytes in 0 blocks
==8247== Rerun with --leak-check=full to see details of leaked memory
==8247== 
==8247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8247== 
==8247== 1 errors in context 1 of 1:
==8247== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8247==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8247==    by 0x488CD0: stringsubst (subst.c:301)
==8247==    by 0x48801B: prefork (subst.c:77)
==8247==    by 0x42B318: execcmd (exec.c:2619)
==8247==    by 0x428CA0: execpline2 (exec.c:1697)
==8247==    by 0x427FD2: execpline (exec.c:1484)
==8247==    by 0x427756: execlist (exec.c:1267)
==8247==    by 0x42717C: execode (exec.c:1073)
==8247==    by 0x431299: runshfunc (exec.c:5040)
==8247==    by 0x430E76: doshfunc (exec.c:4920)
==8247==    by 0x4302FB: execshfunc (exec.c:4557)
==8247==    by 0x42D8C1: execcmd (exec.c:3373)
==8247== 
==8247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
==8249== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8249-by-pythonnut-on-???
==8249== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8249-by-pythonnut-on-???
==8249== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8249-by-pythonnut-on-???
==8249== 
==8249== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8249== don't want to do, unless you know exactly what you're doing,
==8249== or are doing some strange experiment):
==8249==   /usr/lib/valgrind/../../bin/vgdb --pid=8249 ...command...
==8249== 
==8249== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8249==   /path/to/gdb ./zsh
==8249== and then give GDB the following command
==8249==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8249
==8249== --pid is optional if only one valgrind process is running
==8249== 
--8248-- Caught __NR_exit; running __libc_freeres()
==8248== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8248-by-pythonnut-on-???
==8248== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8248-by-pythonnut-on-???
==8248== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8248-by-pythonnut-on-???
==8248== 
==8248== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8248== don't want to do, unless you know exactly what you're doing,
==8248== or are doing some strange experiment):
==8248==   /usr/lib/valgrind/../../bin/vgdb --pid=8248 ...command...
==8248== 
==8248== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8248==   /path/to/gdb ./zsh
==8248== and then give GDB the following command
==8248==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8248
==8248== --pid is optional if only one valgrind process is running
==8248== 
--8248-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8248== 
==8248== HEAP SUMMARY:
==8248==     in use at exit: 1,059,265 bytes in 24,034 blocks
==8248==   total heap usage: 648,836 allocs, 624,802 frees, 30,848,298 bytes allocated
==8248== 
==8248== Searching for pointers to 24,034 not-freed blocks
--8248--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8248--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8248--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8248--   Scanning root segment: 0x402a000..0x402afff (4096)
--8248--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8248--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8248--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8248--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8248--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8248--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8248--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8248--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8248--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8248--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8248--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8248--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8248--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8248--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8248--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8248--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8248--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8248--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8248--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8248--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8248--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8248--   Scanning root segment: 0x701a000..0x701afff (4096)
--8248--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8248--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8248--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8248--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8248--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8248--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8248--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8248== Checked 1,331,856 bytes
==8248== 
==8248== LEAK SUMMARY:
==8248==    definitely lost: 253 bytes in 4 blocks
==8248==    indirectly lost: 6,756 bytes in 7 blocks
==8248==      possibly lost: 0 bytes in 0 blocks
==8248==    still reachable: 1,052,256 bytes in 24,023 blocks
==8248==         suppressed: 0 bytes in 0 blocks
==8248== Rerun with --leak-check=full to see details of leaked memory
==8248== 
==8248== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8248== 
==8248== 1 errors in context 1 of 1:
==8248== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8248==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8248==    by 0x488CD0: stringsubst (subst.c:301)
==8248==    by 0x48801B: prefork (subst.c:77)
==8248==    by 0x42B318: execcmd (exec.c:2619)
==8248==    by 0x428CA0: execpline2 (exec.c:1697)
==8248==    by 0x427FD2: execpline (exec.c:1484)
==8248==    by 0x427756: execlist (exec.c:1267)
==8248==    by 0x42717C: execode (exec.c:1073)
==8248==    by 0x431299: runshfunc (exec.c:5040)
==8248==    by 0x430E76: doshfunc (exec.c:4920)
==8248==    by 0x4302FB: execshfunc (exec.c:4557)
==8248==    by 0x42D8C1: execcmd (exec.c:3373)
==8248== 
==8248== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8251== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8251-by-pythonnut-on-???
==8251== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8251-by-pythonnut-on-???
==8251== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8251-by-pythonnut-on-???
==8251== 
==8251== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8251== don't want to do, unless you know exactly what you're doing,
==8251== or are doing some strange experiment):
==8251==   /usr/lib/valgrind/../../bin/vgdb --pid=8251 ...command...
==8251== 
==8251== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8251==   /path/to/gdb ./zsh
==8251== and then give GDB the following command
==8251==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8251
==8251== --pid is optional if only one valgrind process is running
==8251== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8250-- Caught __NR_exit; running __libc_freeres()
==8250== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8250-by-pythonnut-on-???
==8250== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8250-by-pythonnut-on-???
==8250== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8250-by-pythonnut-on-???
==8250== 
==8250== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8250== don't want to do, unless you know exactly what you're doing,
==8250== or are doing some strange experiment):
==8250==   /usr/lib/valgrind/../../bin/vgdb --pid=8250 ...command...
==8250== 
==8250== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8250==   /path/to/gdb ./zsh
==8250== and then give GDB the following command
==8250==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8250
==8250== --pid is optional if only one valgrind process is running
==8250== 
--8250-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8250== 
==8250== HEAP SUMMARY:
==8250==     in use at exit: 1,059,633 bytes in 24,043 blocks
==8250==   total heap usage: 648,870 allocs, 624,827 frees, 30,854,873 bytes allocated
==8250== 
==8250== Searching for pointers to 24,043 not-freed blocks
--8250--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8250--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8250--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8250--   Scanning root segment: 0x402a000..0x402afff (4096)
--8250--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8250--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8250--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8250--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8250--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8250--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8250--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8250--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8250--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8250--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8250--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8250--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8250--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8250--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8250--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8250--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8250--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8250--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8250--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8250--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8250--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8250--   Scanning root segment: 0x701a000..0x701afff (4096)
--8250--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8250--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8250--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8250--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8250--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8250--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8250--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8250== Checked 1,332,200 bytes
==8250== 
==8250== LEAK SUMMARY:
==8250==    definitely lost: 253 bytes in 4 blocks
==8250==    indirectly lost: 6,756 bytes in 7 blocks
==8250==      possibly lost: 0 bytes in 0 blocks
==8250==    still reachable: 1,052,624 bytes in 24,032 blocks
==8250==         suppressed: 0 bytes in 0 blocks
==8250== Rerun with --leak-check=full to see details of leaked memory
==8250== 
==8250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8250== 
==8250== 1 errors in context 1 of 1:
==8250== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8250==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8250==    by 0x488CD0: stringsubst (subst.c:301)
==8250==    by 0x48801B: prefork (subst.c:77)
==8250==    by 0x42B318: execcmd (exec.c:2619)
==8250==    by 0x428CA0: execpline2 (exec.c:1697)
==8250==    by 0x427FD2: execpline (exec.c:1484)
==8250==    by 0x427756: execlist (exec.c:1267)
==8250==    by 0x42717C: execode (exec.c:1073)
==8250==    by 0x431299: runshfunc (exec.c:5040)
==8250==    by 0x430E76: doshfunc (exec.c:4920)
==8250==    by 0x4302FB: execshfunc (exec.c:4557)
==8250==    by 0x42D8C1: execcmd (exec.c:3373)
==8250== 
==8250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8253== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8253-by-pythonnut-on-???
==8253== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8253-by-pythonnut-on-???
==8253== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8253-by-pythonnut-on-???
==8253== 
==8253== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8253== don't want to do, unless you know exactly what you're doing,
==8253== or are doing some strange experiment):
==8253==   /usr/lib/valgrind/../../bin/vgdb --pid=8253 ...command...
==8253== 
==8253== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8253==   /path/to/gdb ./zsh
==8253== and then give GDB the following command
==8253==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8253
==8253== --pid is optional if only one valgrind process is running
==8253== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8252-- Caught __NR_exit; running __libc_freeres()
==8252== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8252-by-pythonnut-on-???
==8252== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8252-by-pythonnut-on-???
==8252== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8252-by-pythonnut-on-???
==8252== 
==8252== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8252== don't want to do, unless you know exactly what you're doing,
==8252== or are doing some strange experiment):
==8252==   /usr/lib/valgrind/../../bin/vgdb --pid=8252 ...command...
==8252== 
==8252== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8252==   /path/to/gdb ./zsh
==8252== and then give GDB the following command
==8252==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8252
==8252== --pid is optional if only one valgrind process is running
==8252== 
--8252-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8252== 
==8252== HEAP SUMMARY:
==8252==     in use at exit: 1,060,067 bytes in 24,052 blocks
==8252==   total heap usage: 648,904 allocs, 624,852 frees, 30,861,449 bytes allocated
==8252== 
==8252== Searching for pointers to 24,052 not-freed blocks
--8252--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8252--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8252--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8252--   Scanning root segment: 0x402a000..0x402afff (4096)
--8252--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8252--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8252--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8252--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8252--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8252--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8252--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8252--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8252--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8252--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8252--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8252--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8252--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8252--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8252--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8252--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8252--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8252--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8252--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8252--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8252--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8252--   Scanning root segment: 0x701a000..0x701afff (4096)
--8252--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8252--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8252--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8252--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8252--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8252--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8252--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8252== Checked 1,332,568 bytes
==8252== 
==8252== LEAK SUMMARY:
==8252==    definitely lost: 253 bytes in 4 blocks
==8252==    indirectly lost: 6,756 bytes in 7 blocks
==8252==      possibly lost: 0 bytes in 0 blocks
==8252==    still reachable: 1,053,058 bytes in 24,041 blocks
==8252==         suppressed: 0 bytes in 0 blocks
==8252== Rerun with --leak-check=full to see details of leaked memory
==8252== 
==8252== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8252== 
==8252== 1 errors in context 1 of 1:
==8252== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8252==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8252==    by 0x488CD0: stringsubst (subst.c:301)
==8252==    by 0x48801B: prefork (subst.c:77)
==8252==    by 0x42B318: execcmd (exec.c:2619)
==8252==    by 0x428CA0: execpline2 (exec.c:1697)
==8252==    by 0x427FD2: execpline (exec.c:1484)
==8252==    by 0x427756: execlist (exec.c:1267)
==8252==    by 0x42717C: execode (exec.c:1073)
==8252==    by 0x431299: runshfunc (exec.c:5040)
==8252==    by 0x430E76: doshfunc (exec.c:4920)
==8252==    by 0x4302FB: execshfunc (exec.c:4557)
==8252==    by 0x42D8C1: execcmd (exec.c:3373)
==8252== 
==8252== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8255-by-pythonnut-on-???
==8255== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8255-by-pythonnut-on-???
==8255== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8255-by-pythonnut-on-???
==8255== 
==8255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8255== don't want to do, unless you know exactly what you're doing,
==8255== or are doing some strange experiment):
==8255==   /usr/lib/valgrind/../../bin/vgdb --pid=8255 ...command...
==8255== 
==8255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8255==   /path/to/gdb ./zsh
==8255== and then give GDB the following command
==8255==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8255
==8255== --pid is optional if only one valgrind process is running
==8255== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8254-- Caught __NR_exit; running __libc_freeres()
==8254== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8254-by-pythonnut-on-???
==8254== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8254-by-pythonnut-on-???
==8254== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8254-by-pythonnut-on-???
==8254== 
==8254== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8254== don't want to do, unless you know exactly what you're doing,
==8254== or are doing some strange experiment):
==8254==   /usr/lib/valgrind/../../bin/vgdb --pid=8254 ...command...
==8254== 
==8254== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8254==   /path/to/gdb ./zsh
==8254== and then give GDB the following command
==8254==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8254
==8254== --pid is optional if only one valgrind process is running
==8254== 
--8254-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8254== 
==8254== HEAP SUMMARY:
==8254==     in use at exit: 1,060,500 bytes in 24,061 blocks
==8254==   total heap usage: 648,938 allocs, 624,877 frees, 30,868,028 bytes allocated
==8254== 
==8254== Searching for pointers to 24,061 not-freed blocks
--8254--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8254--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8254--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8254--   Scanning root segment: 0x402a000..0x402afff (4096)
--8254--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8254--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8254--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8254--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8254--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8254--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8254--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8254--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8254--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8254--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8254--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8254--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8254--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8254--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8254--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8254--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8254--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8254--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8254--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8254--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8254--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8254--   Scanning root segment: 0x701a000..0x701afff (4096)
--8254--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8254--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8254--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8254--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8254--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8254--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8254--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8254== Checked 1,332,960 bytes
==8254== 
==8254== LEAK SUMMARY:
==8254==    definitely lost: 253 bytes in 4 blocks
==8254==    indirectly lost: 6,756 bytes in 7 blocks
==8254==      possibly lost: 0 bytes in 0 blocks
==8254==    still reachable: 1,053,491 bytes in 24,050 blocks
==8254==         suppressed: 0 bytes in 0 blocks
==8254== Rerun with --leak-check=full to see details of leaked memory
==8254== 
==8254== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8254== 
==8254== 1 errors in context 1 of 1:
==8254== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8254==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8254==    by 0x488CD0: stringsubst (subst.c:301)
==8254==    by 0x48801B: prefork (subst.c:77)
==8254==    by 0x42B318: execcmd (exec.c:2619)
==8254==    by 0x428CA0: execpline2 (exec.c:1697)
==8254==    by 0x427FD2: execpline (exec.c:1484)
==8254==    by 0x427756: execlist (exec.c:1267)
==8254==    by 0x42717C: execode (exec.c:1073)
==8254==    by 0x431299: runshfunc (exec.c:5040)
==8254==    by 0x430E76: doshfunc (exec.c:4920)
==8254==    by 0x4302FB: execshfunc (exec.c:4557)
==8254==    by 0x42D8C1: execcmd (exec.c:3373)
==8254== 
==8254== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8257== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8257-by-pythonnut-on-???
==8257== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8257-by-pythonnut-on-???
==8257== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8257-by-pythonnut-on-???
==8257== 
==8257== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8257== don't want to do, unless you know exactly what you're doing,
==8257== or are doing some strange experiment):
==8257==   /usr/lib/valgrind/../../bin/vgdb --pid=8257 ...command...
==8257== 
==8257== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8257==   /path/to/gdb ./zsh
==8257== and then give GDB the following command
==8257==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8257
==8257== --pid is optional if only one valgrind process is running
==8257== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8256-- Caught __NR_exit; running __libc_freeres()
==8256== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8256-by-pythonnut-on-???
==8256== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8256-by-pythonnut-on-???
==8256== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8256-by-pythonnut-on-???
==8256== 
==8256== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8256== don't want to do, unless you know exactly what you're doing,
==8256== or are doing some strange experiment):
==8256==   /usr/lib/valgrind/../../bin/vgdb --pid=8256 ...command...
==8256== 
==8256== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8256==   /path/to/gdb ./zsh
==8256== and then give GDB the following command
==8256==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8256
==8256== --pid is optional if only one valgrind process is running
==8256== 
--8256-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8256== 
==8256== HEAP SUMMARY:
==8256==     in use at exit: 1,060,941 bytes in 24,070 blocks
==8256==   total heap usage: 648,972 allocs, 624,902 frees, 30,874,614 bytes allocated
==8256== 
==8256== Searching for pointers to 24,070 not-freed blocks
--8256--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8256--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8256--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8256--   Scanning root segment: 0x402a000..0x402afff (4096)
--8256--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8256--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8256--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8256--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8256--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8256--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8256--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8256--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8256--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8256--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8256--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8256--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8256--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8256--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8256--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8256--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8256--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8256--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8256--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8256--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8256--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8256--   Scanning root segment: 0x701a000..0x701afff (4096)
--8256--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8256--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8256--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8256--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8256--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8256--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8256--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8256== Checked 1,333,352 bytes
==8256== 
==8256== LEAK SUMMARY:
==8256==    definitely lost: 253 bytes in 4 blocks
==8256==    indirectly lost: 6,756 bytes in 7 blocks
==8256==      possibly lost: 0 bytes in 0 blocks
==8256==    still reachable: 1,053,932 bytes in 24,059 blocks
==8256==         suppressed: 0 bytes in 0 blocks
==8256== Rerun with --leak-check=full to see details of leaked memory
==8256== 
==8256== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8256== 
==8256== 1 errors in context 1 of 1:
==8256== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8256==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8256==    by 0x488CD0: stringsubst (subst.c:301)
==8256==    by 0x48801B: prefork (subst.c:77)
==8256==    by 0x42B318: execcmd (exec.c:2619)
==8256==    by 0x428CA0: execpline2 (exec.c:1697)
==8256==    by 0x427FD2: execpline (exec.c:1484)
==8256==    by 0x427756: execlist (exec.c:1267)
==8256==    by 0x42717C: execode (exec.c:1073)
==8256==    by 0x431299: runshfunc (exec.c:5040)
==8256==    by 0x430E76: doshfunc (exec.c:4920)
==8256==    by 0x4302FB: execshfunc (exec.c:4557)
==8256==    by 0x42D8C1: execcmd (exec.c:3373)
==8256== 
==8256== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8259-by-pythonnut-on-???
==8259== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8259-by-pythonnut-on-???
==8259== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8259-by-pythonnut-on-???
==8259== 
==8259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8259== don't want to do, unless you know exactly what you're doing,
==8259== or are doing some strange experiment):
==8259==   /usr/lib/valgrind/../../bin/vgdb --pid=8259 ...command...
==8259== 
==8259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8259==   /path/to/gdb ./zsh
==8259== and then give GDB the following command
==8259==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8259
==8259== --pid is optional if only one valgrind process is running
==8259== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8258-- Caught __NR_exit; running __libc_freeres()
==8258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8258-by-pythonnut-on-???
==8258== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8258-by-pythonnut-on-???
==8258== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8258-by-pythonnut-on-???
==8258== 
==8258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8258== don't want to do, unless you know exactly what you're doing,
==8258== or are doing some strange experiment):
==8258==   /usr/lib/valgrind/../../bin/vgdb --pid=8258 ...command...
==8258== 
==8258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8258==   /path/to/gdb ./zsh
==8258== and then give GDB the following command
==8258==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8258
==8258== --pid is optional if only one valgrind process is running
==8258== 
--8258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8258== 
==8258== HEAP SUMMARY:
==8258==     in use at exit: 1,061,377 bytes in 24,079 blocks
==8258==   total heap usage: 649,006 allocs, 624,927 frees, 30,881,205 bytes allocated
==8258== 
==8258== Searching for pointers to 24,079 not-freed blocks
--8258--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8258--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8258--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8258--   Scanning root segment: 0x402a000..0x402afff (4096)
--8258--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8258--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8258--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8258--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8258--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8258--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8258--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8258--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8258--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8258--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8258--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8258--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8258--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8258--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8258--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8258--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8258--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8258--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8258--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8258--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8258--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8258--   Scanning root segment: 0x701a000..0x701afff (4096)
--8258--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8258--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8258--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8258--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8258--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8258--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8258--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8258== Checked 1,333,752 bytes
==8258== 
==8258== LEAK SUMMARY:
==8258==    definitely lost: 253 bytes in 4 blocks
==8258==    indirectly lost: 6,756 bytes in 7 blocks
==8258==      possibly lost: 0 bytes in 0 blocks
==8258==    still reachable: 1,054,368 bytes in 24,068 blocks
==8258==         suppressed: 0 bytes in 0 blocks
==8258== Rerun with --leak-check=full to see details of leaked memory
==8258== 
==8258== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8258== 
==8258== 1 errors in context 1 of 1:
==8258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8258==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8258==    by 0x488CD0: stringsubst (subst.c:301)
==8258==    by 0x48801B: prefork (subst.c:77)
==8258==    by 0x42B318: execcmd (exec.c:2619)
==8258==    by 0x428CA0: execpline2 (exec.c:1697)
==8258==    by 0x427FD2: execpline (exec.c:1484)
==8258==    by 0x427756: execlist (exec.c:1267)
==8258==    by 0x42717C: execode (exec.c:1073)
==8258==    by 0x431299: runshfunc (exec.c:5040)
==8258==    by 0x430E76: doshfunc (exec.c:4920)
==8258==    by 0x4302FB: execshfunc (exec.c:4557)
==8258==    by 0x42D8C1: execcmd (exec.c:3373)
==8258== 
==8258== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8261-by-pythonnut-on-???
==8261== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8261-by-pythonnut-on-???
==8261== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8261-by-pythonnut-on-???
==8261== 
==8261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8261== don't want to do, unless you know exactly what you're doing,
==8261== or are doing some strange experiment):
==8261==   /usr/lib/valgrind/../../bin/vgdb --pid=8261 ...command...
==8261== 
==8261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8261==   /path/to/gdb ./zsh
==8261== and then give GDB the following command
==8261==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8261
==8261== --pid is optional if only one valgrind process is running
==8261== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8260-- Caught __NR_exit; running __libc_freeres()
==8260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8260-by-pythonnut-on-???
==8260== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8260-by-pythonnut-on-???
==8260== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8260-by-pythonnut-on-???
==8260== 
==8260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8260== don't want to do, unless you know exactly what you're doing,
==8260== or are doing some strange experiment):
==8260==   /usr/lib/valgrind/../../bin/vgdb --pid=8260 ...command...
==8260== 
==8260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8260==   /path/to/gdb ./zsh
==8260== and then give GDB the following command
==8260==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8260
==8260== --pid is optional if only one valgrind process is running
==8260== 
--8260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8260== 
==8260== HEAP SUMMARY:
==8260==     in use at exit: 1,061,829 bytes in 24,088 blocks
==8260==   total heap usage: 649,040 allocs, 624,952 frees, 30,887,811 bytes allocated
==8260== 
==8260== Searching for pointers to 24,088 not-freed blocks
--8260--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8260--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8260--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8260--   Scanning root segment: 0x402a000..0x402afff (4096)
--8260--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8260--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8260--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8260--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8260--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8260--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8260--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8260--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8260--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8260--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8260--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8260--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8260--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8260--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8260--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8260--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8260--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8260--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8260--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8260--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8260--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8260--   Scanning root segment: 0x701a000..0x701afff (4096)
--8260--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8260--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8260--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8260--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8260--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8260--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8260--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8260== Checked 1,334,128 bytes
==8260== 
==8260== LEAK SUMMARY:
==8260==    definitely lost: 253 bytes in 4 blocks
==8260==    indirectly lost: 6,756 bytes in 7 blocks
==8260==      possibly lost: 0 bytes in 0 blocks
==8260==    still reachable: 1,054,820 bytes in 24,077 blocks
==8260==         suppressed: 0 bytes in 0 blocks
==8260== Rerun with --leak-check=full to see details of leaked memory
==8260== 
==8260== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8260== 
==8260== 1 errors in context 1 of 1:
==8260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8260==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8260==    by 0x488CD0: stringsubst (subst.c:301)
==8260==    by 0x48801B: prefork (subst.c:77)
==8260==    by 0x42B318: execcmd (exec.c:2619)
==8260==    by 0x428CA0: execpline2 (exec.c:1697)
==8260==    by 0x427FD2: execpline (exec.c:1484)
==8260==    by 0x427756: execlist (exec.c:1267)
==8260==    by 0x42717C: execode (exec.c:1073)
==8260==    by 0x431299: runshfunc (exec.c:5040)
==8260==    by 0x430E76: doshfunc (exec.c:4920)
==8260==    by 0x4302FB: execshfunc (exec.c:4557)
==8260==    by 0x42D8C1: execcmd (exec.c:3373)
==8260== 
==8260== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8263-by-pythonnut-on-???
==8263== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8263-by-pythonnut-on-???
==8263== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8263-by-pythonnut-on-???
==8263== 
==8263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8263== don't want to do, unless you know exactly what you're doing,
==8263== or are doing some strange experiment):
==8263==   /usr/lib/valgrind/../../bin/vgdb --pid=8263 ...command...
==8263== 
==8263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8263==   /path/to/gdb ./zsh
==8263== and then give GDB the following command
==8263==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8263
==8263== --pid is optional if only one valgrind process is running
==8263== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8262-- Caught __NR_exit; running __libc_freeres()
==8262== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8262-by-pythonnut-on-???
==8262== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8262-by-pythonnut-on-???
==8262== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8262-by-pythonnut-on-???
==8262== 
==8262== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8262== don't want to do, unless you know exactly what you're doing,
==8262== or are doing some strange experiment):
==8262==   /usr/lib/valgrind/../../bin/vgdb --pid=8262 ...command...
==8262== 
==8262== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8262==   /path/to/gdb ./zsh
==8262== and then give GDB the following command
==8262==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8262
==8262== --pid is optional if only one valgrind process is running
==8262== 
--8262-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8262== 
==8262== HEAP SUMMARY:
==8262==     in use at exit: 1,062,276 bytes in 24,097 blocks
==8262==   total heap usage: 649,074 allocs, 624,977 frees, 30,894,430 bytes allocated
==8262== 
==8262== Searching for pointers to 24,097 not-freed blocks
--8262--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8262--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8262--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8262--   Scanning root segment: 0x402a000..0x402afff (4096)
--8262--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8262--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8262--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8262--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8262--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8262--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8262--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8262--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8262--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8262--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8262--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8262--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8262--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8262--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8262--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8262--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8262--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8262--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8262--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8262--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8262--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8262--   Scanning root segment: 0x701a000..0x701afff (4096)
--8262--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8262--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8262--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8262--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8262--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8262--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8262--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8262== Checked 1,334,536 bytes
==8262== 
==8262== LEAK SUMMARY:
==8262==    definitely lost: 253 bytes in 4 blocks
==8262==    indirectly lost: 6,756 bytes in 7 blocks
==8262==      possibly lost: 0 bytes in 0 blocks
==8262==    still reachable: 1,055,267 bytes in 24,086 blocks
==8262==         suppressed: 0 bytes in 0 blocks
==8262== Rerun with --leak-check=full to see details of leaked memory
==8262== 
==8262== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8262== 
==8262== 1 errors in context 1 of 1:
==8262== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8262==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8262==    by 0x488CD0: stringsubst (subst.c:301)
==8262==    by 0x48801B: prefork (subst.c:77)
==8262==    by 0x42B318: execcmd (exec.c:2619)
==8262==    by 0x428CA0: execpline2 (exec.c:1697)
==8262==    by 0x427FD2: execpline (exec.c:1484)
==8262==    by 0x427756: execlist (exec.c:1267)
==8262==    by 0x42717C: execode (exec.c:1073)
==8262==    by 0x431299: runshfunc (exec.c:5040)
==8262==    by 0x430E76: doshfunc (exec.c:4920)
==8262==    by 0x4302FB: execshfunc (exec.c:4557)
==8262==    by 0x42D8C1: execcmd (exec.c:3373)
==8262== 
==8262== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8264== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8264-by-pythonnut-on-???
==8264== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8264-by-pythonnut-on-???
==8264== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8264-by-pythonnut-on-???
==8264== 
==8264== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8264== don't want to do, unless you know exactly what you're doing,
==8264== or are doing some strange experiment):
==8264==   /usr/lib/valgrind/../../bin/vgdb --pid=8264 ...command...
==8264== 
==8264== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8264==   /path/to/gdb ./zsh
==8264== and then give GDB the following command
==8264==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8264
==8264== --pid is optional if only one valgrind process is running
==8264== 
==8265== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8265-by-pythonnut-on-???
==8265== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8265-by-pythonnut-on-???
==8265== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8265-by-pythonnut-on-???
==8265== 
==8265== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8265== don't want to do, unless you know exactly what you're doing,
==8265== or are doing some strange experiment):
==8265==   /usr/lib/valgrind/../../bin/vgdb --pid=8265 ...command...
==8265== 
==8265== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8265==   /path/to/gdb ./zsh
==8265== and then give GDB the following command
==8265==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8265
==8265== --pid is optional if only one valgrind process is running
==8265== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8264-- Caught __NR_exit; running __libc_freeres()
--8264-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8264== 
==8264== HEAP SUMMARY:
==8264==     in use at exit: 1,071,976 bytes in 24,211 blocks
==8264==   total heap usage: 649,502 allocs, 625,291 frees, 30,944,986 bytes allocated
==8264== 
==8264== Searching for pointers to 24,211 not-freed blocks
--8264--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8264--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8264--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8264--   Scanning root segment: 0x402a000..0x402efff (20480)
--8264--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8264--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8264--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8264--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8264--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8264--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8264--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8264--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8264--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8264--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8264--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8264--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8264--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8264--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8264--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8264--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8264--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8264--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8264--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8264--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8264--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8264--   Scanning root segment: 0x701a000..0x701afff (4096)
--8264--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8264--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8264--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8264--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8264--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8264--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8264--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8264== Checked 1,361,544 bytes
==8264== 
==8264== LEAK SUMMARY:
==8264==    definitely lost: 253 bytes in 4 blocks
==8264==    indirectly lost: 6,756 bytes in 7 blocks
==8264==      possibly lost: 0 bytes in 0 blocks
==8264==    still reachable: 1,064,967 bytes in 24,200 blocks
==8264==         suppressed: 0 bytes in 0 blocks
==8264== Rerun with --leak-check=full to see details of leaked memory
==8264== 
==8264== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8264== 
==8264== 1 errors in context 1 of 1:
==8264== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8264==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8264==    by 0x488CD0: stringsubst (subst.c:301)
==8264==    by 0x48801B: prefork (subst.c:77)
==8264==    by 0x42B318: execcmd (exec.c:2619)
==8264==    by 0x428CA0: execpline2 (exec.c:1697)
==8264==    by 0x427FD2: execpline (exec.c:1484)
==8264==    by 0x427756: execlist (exec.c:1267)
==8264==    by 0x42717C: execode (exec.c:1073)
==8264==    by 0x431299: runshfunc (exec.c:5040)
==8264==    by 0x430E76: doshfunc (exec.c:4920)
==8264==    by 0x4302FB: execshfunc (exec.c:4557)
==8264==    by 0x42D8C1: execcmd (exec.c:3373)
==8264== 
==8264== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8266-by-pythonnut-on-???
==8266== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8266-by-pythonnut-on-???
==8266== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8266-by-pythonnut-on-???
==8266== 
==8266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8266== don't want to do, unless you know exactly what you're doing,
==8266== or are doing some strange experiment):
==8266==   /usr/lib/valgrind/../../bin/vgdb --pid=8266 ...command...
==8266== 
==8266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8266==   /path/to/gdb ./zsh
==8266== and then give GDB the following command
==8266==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8266
==8266== --pid is optional if only one valgrind process is running
==8266== 
==8267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8267-by-pythonnut-on-???
==8267== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8267-by-pythonnut-on-???
==8267== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8267-by-pythonnut-on-???
==8267== 
==8267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8267== don't want to do, unless you know exactly what you're doing,
==8267== or are doing some strange experiment):
==8267==   /usr/lib/valgrind/../../bin/vgdb --pid=8267 ...command...
==8267== 
==8267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8267==   /path/to/gdb ./zsh
==8267== and then give GDB the following command
==8267==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8267
==8267== --pid is optional if only one valgrind process is running
==8267== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8266-- Caught __NR_exit; running __libc_freeres()
--8266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8266== 
==8266== HEAP SUMMARY:
==8266==     in use at exit: 1,075,241 bytes in 24,288 blocks
==8266==   total heap usage: 649,725 allocs, 625,437 frees, 30,960,698 bytes allocated
==8266== 
==8266== Searching for pointers to 24,288 not-freed blocks
--8266--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8266--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8266--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8266--   Scanning root segment: 0x402a000..0x402efff (20480)
--8266--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8266--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8266--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8266--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8266--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8266--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8266--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8266--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8266--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8266--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8266--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8266--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8266--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8266--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8266--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8266--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8266--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8266--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8266--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8266--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8266--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8266--   Scanning root segment: 0x701a000..0x701afff (4096)
--8266--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8266--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8266--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8266--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8266--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8266--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8266--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8266== Checked 1,364,512 bytes
==8266== 
==8266== LEAK SUMMARY:
==8266==    definitely lost: 253 bytes in 4 blocks
==8266==    indirectly lost: 6,756 bytes in 7 blocks
==8266==      possibly lost: 0 bytes in 0 blocks
==8266==    still reachable: 1,068,232 bytes in 24,277 blocks
==8266==         suppressed: 0 bytes in 0 blocks
==8266== Rerun with --leak-check=full to see details of leaked memory
==8266== 
==8266== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8266== 
==8266== 1 errors in context 1 of 1:
==8266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8266==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8266==    by 0x488CD0: stringsubst (subst.c:301)
==8266==    by 0x48801B: prefork (subst.c:77)
==8266==    by 0x42B318: execcmd (exec.c:2619)
==8266==    by 0x428CA0: execpline2 (exec.c:1697)
==8266==    by 0x427FD2: execpline (exec.c:1484)
==8266==    by 0x427756: execlist (exec.c:1267)
==8266==    by 0x42717C: execode (exec.c:1073)
==8266==    by 0x431299: runshfunc (exec.c:5040)
==8266==    by 0x430E76: doshfunc (exec.c:4920)
==8266==    by 0x4302FB: execshfunc (exec.c:4557)
==8266==    by 0x42D8C1: execcmd (exec.c:3373)
==8266== 
==8266== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8268== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8268-by-pythonnut-on-???
==8268== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8268-by-pythonnut-on-???
==8268== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8268-by-pythonnut-on-???
==8268== 
==8268== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8268== don't want to do, unless you know exactly what you're doing,
==8268== or are doing some strange experiment):
==8268==   /usr/lib/valgrind/../../bin/vgdb --pid=8268 ...command...
==8268== 
==8268== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8268==   /path/to/gdb ./zsh
==8268== and then give GDB the following command
==8268==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8268
==8268== --pid is optional if only one valgrind process is running
==8268== 
==8269== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8269-by-pythonnut-on-???
==8269== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8269-by-pythonnut-on-???
==8269== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8269-by-pythonnut-on-???
==8269== 
==8269== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8269== don't want to do, unless you know exactly what you're doing,
==8269== or are doing some strange experiment):
==8269==   /usr/lib/valgrind/../../bin/vgdb --pid=8269 ...command...
==8269== 
==8269== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8269==   /path/to/gdb ./zsh
==8269== and then give GDB the following command
==8269==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8269
==8269== --pid is optional if only one valgrind process is running
==8269== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8268-- Caught __NR_exit; running __libc_freeres()
--8268-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8268== 
==8268== HEAP SUMMARY:
==8268==     in use at exit: 1,077,748 bytes in 24,347 blocks
==8268==   total heap usage: 649,895 allocs, 625,548 frees, 30,974,459 bytes allocated
==8268== 
==8268== Searching for pointers to 24,347 not-freed blocks
--8268--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8268--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8268--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8268--   Scanning root segment: 0x402a000..0x402efff (20480)
--8268--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8268--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8268--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8268--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8268--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8268--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8268--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8268--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8268--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8268--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8268--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8268--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8268--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8268--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8268--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8268--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8268--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8268--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8268--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8268--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8268--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8268--   Scanning root segment: 0x701a000..0x701afff (4096)
--8268--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8268--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8268--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8268--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8268--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8268--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8268--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8268== Checked 1,366,792 bytes
==8268== 
==8268== LEAK SUMMARY:
==8268==    definitely lost: 253 bytes in 4 blocks
==8268==    indirectly lost: 6,756 bytes in 7 blocks
==8268==      possibly lost: 0 bytes in 0 blocks
==8268==    still reachable: 1,070,739 bytes in 24,336 blocks
==8268==         suppressed: 0 bytes in 0 blocks
==8268== Rerun with --leak-check=full to see details of leaked memory
==8268== 
==8268== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8268== 
==8268== 1 errors in context 1 of 1:
==8268== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8268==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8268==    by 0x488CD0: stringsubst (subst.c:301)
==8268==    by 0x48801B: prefork (subst.c:77)
==8268==    by 0x42B318: execcmd (exec.c:2619)
==8268==    by 0x428CA0: execpline2 (exec.c:1697)
==8268==    by 0x427FD2: execpline (exec.c:1484)
==8268==    by 0x427756: execlist (exec.c:1267)
==8268==    by 0x42717C: execode (exec.c:1073)
==8268==    by 0x431299: runshfunc (exec.c:5040)
==8268==    by 0x430E76: doshfunc (exec.c:4920)
==8268==    by 0x4302FB: execshfunc (exec.c:4557)
==8268==    by 0x42D8C1: execcmd (exec.c:3373)
==8268== 
==8268== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8270-by-pythonnut-on-???
==8270== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8270-by-pythonnut-on-???
==8270== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8270-by-pythonnut-on-???
==8270== 
==8270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8270== don't want to do, unless you know exactly what you're doing,
==8270== or are doing some strange experiment):
==8270==   /usr/lib/valgrind/../../bin/vgdb --pid=8270 ...command...
==8270== 
==8270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8270==   /path/to/gdb ./zsh
==8270== and then give GDB the following command
==8270==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8270
==8270== --pid is optional if only one valgrind process is running
==8270== 
==8271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8271-by-pythonnut-on-???
==8271== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8271-by-pythonnut-on-???
==8271== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8271-by-pythonnut-on-???
==8271== 
==8271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8271== don't want to do, unless you know exactly what you're doing,
==8271== or are doing some strange experiment):
==8271==   /usr/lib/valgrind/../../bin/vgdb --pid=8271 ...command...
==8271== 
==8271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8271==   /path/to/gdb ./zsh
==8271== and then give GDB the following command
==8271==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8271
==8271== --pid is optional if only one valgrind process is running
==8271== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8270-- Caught __NR_exit; running __libc_freeres()
--8270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8270== 
==8270== HEAP SUMMARY:
==8270==     in use at exit: 1,081,028 bytes in 24,425 blocks
==8270==   total heap usage: 650,119 allocs, 625,694 frees, 30,990,186 bytes allocated
==8270== 
==8270== Searching for pointers to 24,425 not-freed blocks
--8270--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8270--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8270--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8270--   Scanning root segment: 0x402a000..0x402efff (20480)
--8270--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8270--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8270--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8270--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8270--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8270--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8270--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8270--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8270--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8270--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8270--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8270--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8270--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8270--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8270--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8270--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8270--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8270--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8270--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8270--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8270--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8270--   Scanning root segment: 0x701a000..0x701afff (4096)
--8270--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8270--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8270--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8270--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8270--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8270--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8270--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8270== Checked 1,369,784 bytes
==8270== 
==8270== LEAK SUMMARY:
==8270==    definitely lost: 253 bytes in 4 blocks
==8270==    indirectly lost: 6,756 bytes in 7 blocks
==8270==      possibly lost: 0 bytes in 0 blocks
==8270==    still reachable: 1,074,019 bytes in 24,414 blocks
==8270==         suppressed: 0 bytes in 0 blocks
==8270== Rerun with --leak-check=full to see details of leaked memory
==8270== 
==8270== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8270== 
==8270== 1 errors in context 1 of 1:
==8270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8270==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8270==    by 0x488CD0: stringsubst (subst.c:301)
==8270==    by 0x48801B: prefork (subst.c:77)
==8270==    by 0x42B318: execcmd (exec.c:2619)
==8270==    by 0x428CA0: execpline2 (exec.c:1697)
==8270==    by 0x427FD2: execpline (exec.c:1484)
==8270==    by 0x427756: execlist (exec.c:1267)
==8270==    by 0x42717C: execode (exec.c:1073)
==8270==    by 0x431299: runshfunc (exec.c:5040)
==8270==    by 0x430E76: doshfunc (exec.c:4920)
==8270==    by 0x4302FB: execshfunc (exec.c:4557)
==8270==    by 0x42D8C1: execcmd (exec.c:3373)
==8270== 
==8270== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8273-by-pythonnut-on-???
==8273== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8273-by-pythonnut-on-???
==8273== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8273-by-pythonnut-on-???
==8273== 
==8273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8273== don't want to do, unless you know exactly what you're doing,
==8273== or are doing some strange experiment):
==8273==   /usr/lib/valgrind/../../bin/vgdb --pid=8273 ...command...
==8273== 
==8273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8273==   /path/to/gdb ./zsh
==8273== and then give GDB the following command
==8273==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8273
==8273== --pid is optional if only one valgrind process is running
==8273== 
client request: code 4d430005,  addr 0xFFEFF19BC,  len 4
--8272-- Caught __NR_exit; running __libc_freeres()
==8272== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8272-by-pythonnut-on-???
==8272== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8272-by-pythonnut-on-???
==8272== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8272-by-pythonnut-on-???
==8272== 
==8272== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8272== don't want to do, unless you know exactly what you're doing,
==8272== or are doing some strange experiment):
==8272==   /usr/lib/valgrind/../../bin/vgdb --pid=8272 ...command...
==8272== 
==8272== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8272==   /path/to/gdb ./zsh
==8272== and then give GDB the following command
==8272==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8272
==8272== --pid is optional if only one valgrind process is running
==8272== 
--8272-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8272== 
==8272== HEAP SUMMARY:
==8272==     in use at exit: 1,088,028 bytes in 24,535 blocks
==8272==   total heap usage: 650,478 allocs, 625,943 frees, 31,021,020 bytes allocated
==8272== 
==8272== Searching for pointers to 24,535 not-freed blocks
--8272--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8272--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8272--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8272--   Scanning root segment: 0x402a000..0x402efff (20480)
--8272--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8272--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8272--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8272--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8272--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8272--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8272--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8272--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8272--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8272--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8272--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8272--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8272--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8272--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8272--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8272--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8272--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8272--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8272--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8272--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8272--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8272--   Scanning root segment: 0x701a000..0x701afff (4096)
--8272--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8272--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8272--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8272--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8272--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8272--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8272--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8272== Checked 1,377,312 bytes
==8272== 
==8272== LEAK SUMMARY:
==8272==    definitely lost: 253 bytes in 4 blocks
==8272==    indirectly lost: 6,756 bytes in 7 blocks
==8272==      possibly lost: 0 bytes in 0 blocks
==8272==    still reachable: 1,081,019 bytes in 24,524 blocks
==8272==         suppressed: 0 bytes in 0 blocks
==8272== Rerun with --leak-check=full to see details of leaked memory
==8272== 
==8272== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8272== 
==8272== 1 errors in context 1 of 1:
==8272== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8272==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8272==    by 0x488CD0: stringsubst (subst.c:301)
==8272==    by 0x48801B: prefork (subst.c:77)
==8272==    by 0x42B318: execcmd (exec.c:2619)
==8272==    by 0x428CA0: execpline2 (exec.c:1697)
==8272==    by 0x427FD2: execpline (exec.c:1484)
==8272==    by 0x427756: execlist (exec.c:1267)
==8272==    by 0x42717C: execode (exec.c:1073)
==8272==    by 0x431299: runshfunc (exec.c:5040)
==8272==    by 0x430E76: doshfunc (exec.c:4920)
==8272==    by 0x4302FB: execshfunc (exec.c:4557)
==8272==    by 0x42D8C1: execcmd (exec.c:3373)
==8272== 
==8272== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8274-by-pythonnut-on-???
==8274== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8274-by-pythonnut-on-???
==8274== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8274-by-pythonnut-on-???
==8274== 
==8274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8274== don't want to do, unless you know exactly what you're doing,
==8274== or are doing some strange experiment):
==8274==   /usr/lib/valgrind/../../bin/vgdb --pid=8274 ...command...
==8274== 
==8274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8274==   /path/to/gdb ./zsh
==8274== and then give GDB the following command
==8274==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8274
==8274== --pid is optional if only one valgrind process is running
==8274== 
==8275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8275-by-pythonnut-on-???
==8275== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8275-by-pythonnut-on-???
==8275== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8275-by-pythonnut-on-???
==8275== 
==8275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8275== don't want to do, unless you know exactly what you're doing,
==8275== or are doing some strange experiment):
==8275==   /usr/lib/valgrind/../../bin/vgdb --pid=8275 ...command...
==8275== 
==8275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8275==   /path/to/gdb ./zsh
==8275== and then give GDB the following command
==8275==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8275
==8275== --pid is optional if only one valgrind process is running
==8275== 
client request: code 4d430005,  addr 0xFFEFF19BC,  len 4
--8274-- Caught __NR_exit; running __libc_freeres()
--8274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8274== 
==8274== HEAP SUMMARY:
==8274==     in use at exit: 1,090,207 bytes in 24,578 blocks
==8274==   total heap usage: 650,601 allocs, 626,023 frees, 31,032,284 bytes allocated
==8274== 
==8274== Searching for pointers to 24,578 not-freed blocks
--8274--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8274--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8274--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8274--   Scanning root segment: 0x402a000..0x402efff (20480)
--8274--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8274--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8274--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8274--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8274--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8274--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8274--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8274--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8274--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8274--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8274--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8274--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8274--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8274--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8274--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8274--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8274--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8274--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8274--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8274--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8274--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8274--   Scanning root segment: 0x701a000..0x701afff (4096)
--8274--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8274--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8274--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8274--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8274--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8274--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8274--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8274== Checked 1,379,288 bytes
==8274== 
==8274== LEAK SUMMARY:
==8274==    definitely lost: 253 bytes in 4 blocks
==8274==    indirectly lost: 6,756 bytes in 7 blocks
==8274==      possibly lost: 0 bytes in 0 blocks
==8274==    still reachable: 1,083,198 bytes in 24,567 blocks
==8274==         suppressed: 0 bytes in 0 blocks
==8274== Rerun with --leak-check=full to see details of leaked memory
==8274== 
==8274== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8274== 
==8274== 1 errors in context 1 of 1:
==8274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8274==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8274==    by 0x488CD0: stringsubst (subst.c:301)
==8274==    by 0x48801B: prefork (subst.c:77)
==8274==    by 0x42B318: execcmd (exec.c:2619)
==8274==    by 0x428CA0: execpline2 (exec.c:1697)
==8274==    by 0x427FD2: execpline (exec.c:1484)
==8274==    by 0x427756: execlist (exec.c:1267)
==8274==    by 0x42717C: execode (exec.c:1073)
==8274==    by 0x431299: runshfunc (exec.c:5040)
==8274==    by 0x430E76: doshfunc (exec.c:4920)
==8274==    by 0x4302FB: execshfunc (exec.c:4557)
==8274==    by 0x42D8C1: execcmd (exec.c:3373)
==8274== 
==8274== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8276-by-pythonnut-on-???
==8276== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8276-by-pythonnut-on-???
==8276== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8276-by-pythonnut-on-???
==8276== 
==8276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8276== don't want to do, unless you know exactly what you're doing,
==8276== or are doing some strange experiment):
==8276==   /usr/lib/valgrind/../../bin/vgdb --pid=8276 ...command...
==8276== 
==8276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8276==   /path/to/gdb ./zsh
==8276== and then give GDB the following command
==8276==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8276
==8276== --pid is optional if only one valgrind process is running
==8276== 
==8277== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8277-by-pythonnut-on-???
==8277== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8277-by-pythonnut-on-???
==8277== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8277-by-pythonnut-on-???
==8277== 
==8277== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8277== don't want to do, unless you know exactly what you're doing,
==8277== or are doing some strange experiment):
==8277==   /usr/lib/valgrind/../../bin/vgdb --pid=8277 ...command...
==8277== 
==8277== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8277==   /path/to/gdb ./zsh
==8277== and then give GDB the following command
==8277==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8277
==8277== --pid is optional if only one valgrind process is running
==8277== 
client request: code 4d430005,  addr 0xFFEFF19BC,  len 4
--8276-- Caught __NR_exit; running __libc_freeres()
--8276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8276== 
==8276== HEAP SUMMARY:
==8276==     in use at exit: 1,092,386 bytes in 24,621 blocks
==8276==   total heap usage: 650,724 allocs, 626,103 frees, 31,043,548 bytes allocated
==8276== 
==8276== Searching for pointers to 24,621 not-freed blocks
--8276--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8276--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8276--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8276--   Scanning root segment: 0x402a000..0x402efff (20480)
--8276--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8276--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8276--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8276--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8276--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8276--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8276--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8276--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8276--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8276--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8276--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8276--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8276--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8276--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8276--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8276--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8276--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8276--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8276--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8276--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8276--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8276--   Scanning root segment: 0x701a000..0x701afff (4096)
--8276--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8276--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8276--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8276--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8276--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8276--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8276--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8276== Checked 1,381,280 bytes
==8276== 
==8276== LEAK SUMMARY:
==8276==    definitely lost: 253 bytes in 4 blocks
==8276==    indirectly lost: 6,756 bytes in 7 blocks
==8276==      possibly lost: 0 bytes in 0 blocks
==8276==    still reachable: 1,085,377 bytes in 24,610 blocks
==8276==         suppressed: 0 bytes in 0 blocks
==8276== Rerun with --leak-check=full to see details of leaked memory
==8276== 
==8276== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8276== 
==8276== 1 errors in context 1 of 1:
==8276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8276==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8276==    by 0x488CD0: stringsubst (subst.c:301)
==8276==    by 0x48801B: prefork (subst.c:77)
==8276==    by 0x42B318: execcmd (exec.c:2619)
==8276==    by 0x428CA0: execpline2 (exec.c:1697)
==8276==    by 0x427FD2: execpline (exec.c:1484)
==8276==    by 0x427756: execlist (exec.c:1267)
==8276==    by 0x42717C: execode (exec.c:1073)
==8276==    by 0x431299: runshfunc (exec.c:5040)
==8276==    by 0x430E76: doshfunc (exec.c:4920)
==8276==    by 0x4302FB: execshfunc (exec.c:4557)
==8276==    by 0x42D8C1: execcmd (exec.c:3373)
==8276== 
==8276== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8279== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8279-by-pythonnut-on-???
==8279== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8279-by-pythonnut-on-???
==8279== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8279-by-pythonnut-on-???
==8279== 
==8279== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8279== don't want to do, unless you know exactly what you're doing,
==8279== or are doing some strange experiment):
==8279==   /usr/lib/valgrind/../../bin/vgdb --pid=8279 ...command...
==8279== 
==8279== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8279==   /path/to/gdb ./zsh
==8279== and then give GDB the following command
==8279==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8279
==8279== --pid is optional if only one valgrind process is running
==8279== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8278-- Caught __NR_exit; running __libc_freeres()
==8278== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8278-by-pythonnut-on-???
==8278== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8278-by-pythonnut-on-???
==8278== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8278-by-pythonnut-on-???
==8278== 
==8278== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8278== don't want to do, unless you know exactly what you're doing,
==8278== or are doing some strange experiment):
==8278==   /usr/lib/valgrind/../../bin/vgdb --pid=8278 ...command...
==8278== 
==8278== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8278==   /path/to/gdb ./zsh
==8278== and then give GDB the following command
==8278==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8278
==8278== --pid is optional if only one valgrind process is running
==8278== 
--8278-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8278== 
==8278== HEAP SUMMARY:
==8278==     in use at exit: 1,105,102 bytes in 24,785 blocks
==8278==   total heap usage: 651,324 allocs, 626,539 frees, 31,127,303 bytes allocated
==8278== 
==8278== Searching for pointers to 24,785 not-freed blocks
--8278--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8278--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8278--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8278--   Scanning root segment: 0x402a000..0x402afff (4096)
--8278--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8278--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8278--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8278--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8278--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8278--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8278--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8278--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8278--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8278--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8278--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8278--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8278--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8278--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8278--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8278--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8278--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8278--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8278--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8278--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8278--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8278--   Scanning root segment: 0x701a000..0x701afff (4096)
--8278--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8278--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8278--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8278--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8278--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8278--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8278--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8278== Checked 1,374,592 bytes
==8278== 
==8278== LEAK SUMMARY:
==8278==    definitely lost: 253 bytes in 4 blocks
==8278==    indirectly lost: 6,756 bytes in 7 blocks
==8278==      possibly lost: 0 bytes in 0 blocks
==8278==    still reachable: 1,098,093 bytes in 24,774 blocks
==8278==         suppressed: 0 bytes in 0 blocks
==8278== Rerun with --leak-check=full to see details of leaked memory
==8278== 
==8278== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8278== 
==8278== 1 errors in context 1 of 1:
==8278== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8278==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8278==    by 0x488CD0: stringsubst (subst.c:301)
==8278==    by 0x48801B: prefork (subst.c:77)
==8278==    by 0x42B318: execcmd (exec.c:2619)
==8278==    by 0x428CA0: execpline2 (exec.c:1697)
==8278==    by 0x427FD2: execpline (exec.c:1484)
==8278==    by 0x427756: execlist (exec.c:1267)
==8278==    by 0x42717C: execode (exec.c:1073)
==8278==    by 0x431299: runshfunc (exec.c:5040)
==8278==    by 0x430E76: doshfunc (exec.c:4920)
==8278==    by 0x4302FB: execshfunc (exec.c:4557)
==8278==    by 0x42D8C1: execcmd (exec.c:3373)
==8278== 
==8278== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8281-by-pythonnut-on-???
==8281== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8281-by-pythonnut-on-???
==8281== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8281-by-pythonnut-on-???
==8281== 
==8281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8281== don't want to do, unless you know exactly what you're doing,
==8281== or are doing some strange experiment):
==8281==   /usr/lib/valgrind/../../bin/vgdb --pid=8281 ...command...
==8281== 
==8281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8281==   /path/to/gdb ./zsh
==8281== and then give GDB the following command
==8281==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8281
==8281== --pid is optional if only one valgrind process is running
==8281== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8280-- Caught __NR_exit; running __libc_freeres()
==8280== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8280-by-pythonnut-on-???
==8280== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8280-by-pythonnut-on-???
==8280== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8280-by-pythonnut-on-???
==8280== 
==8280== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8280== don't want to do, unless you know exactly what you're doing,
==8280== or are doing some strange experiment):
==8280==   /usr/lib/valgrind/../../bin/vgdb --pid=8280 ...command...
==8280== 
==8280== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8280==   /path/to/gdb ./zsh
==8280== and then give GDB the following command
==8280==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8280
==8280== --pid is optional if only one valgrind process is running
==8280== 
--8280-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8280== 
==8280== HEAP SUMMARY:
==8280==     in use at exit: 1,106,139 bytes in 24,808 blocks
==8280==   total heap usage: 651,404 allocs, 626,596 frees, 31,137,884 bytes allocated
==8280== 
==8280== Searching for pointers to 24,808 not-freed blocks
--8280--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8280--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8280--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8280--   Scanning root segment: 0x402a000..0x402afff (4096)
--8280--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8280--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8280--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8280--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8280--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8280--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8280--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8280--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8280--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8280--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8280--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8280--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8280--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8280--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8280--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8280--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8280--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8280--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8280--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8280--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8280--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8280--   Scanning root segment: 0x701a000..0x701afff (4096)
--8280--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8280--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8280--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8280--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8280--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8280--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8280--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8280== Checked 1,375,520 bytes
==8280== 
==8280== LEAK SUMMARY:
==8280==    definitely lost: 253 bytes in 4 blocks
==8280==    indirectly lost: 6,756 bytes in 7 blocks
==8280==      possibly lost: 0 bytes in 0 blocks
==8280==    still reachable: 1,099,130 bytes in 24,797 blocks
==8280==         suppressed: 0 bytes in 0 blocks
==8280== Rerun with --leak-check=full to see details of leaked memory
==8280== 
==8280== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8280== 
==8280== 1 errors in context 1 of 1:
==8280== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8280==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8280==    by 0x488CD0: stringsubst (subst.c:301)
==8280==    by 0x48801B: prefork (subst.c:77)
==8280==    by 0x42B318: execcmd (exec.c:2619)
==8280==    by 0x428CA0: execpline2 (exec.c:1697)
==8280==    by 0x427FD2: execpline (exec.c:1484)
==8280==    by 0x427756: execlist (exec.c:1267)
==8280==    by 0x42717C: execode (exec.c:1073)
==8280==    by 0x431299: runshfunc (exec.c:5040)
==8280==    by 0x430E76: doshfunc (exec.c:4920)
==8280==    by 0x4302FB: execshfunc (exec.c:4557)
==8280==    by 0x42D8C1: execcmd (exec.c:3373)
==8280== 
==8280== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8282-- Caught __NR_exit; running __libc_freeres()
==8282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8282-by-pythonnut-on-???
==8282== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8282-by-pythonnut-on-???
==8282== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8282-by-pythonnut-on-???
==8282== 
==8282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8282== don't want to do, unless you know exactly what you're doing,
==8282== or are doing some strange experiment):
==8282==   /usr/lib/valgrind/../../bin/vgdb --pid=8282 ...command...
==8282== 
==8282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8282==   /path/to/gdb ./zsh
==8282== and then give GDB the following command
==8282==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8282
==8282== --pid is optional if only one valgrind process is running
==8282== 
--8282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8282== 
==8282== HEAP SUMMARY:
==8282==     in use at exit: 1,131,951 bytes in 25,095 blocks
==8282==   total heap usage: 652,467 allocs, 627,372 frees, 31,313,535 bytes allocated
==8282== 
==8282== Searching for pointers to 25,095 not-freed blocks
--8282--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8282--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8282--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8282--   Scanning root segment: 0x402a000..0x402efff (20480)
--8282--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8282--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8282--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8282--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8282--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8282--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8282--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8282--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8282--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8282--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8282--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8282--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8282--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8282--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8282--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8282--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8282--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8282--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8282--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8282--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8282--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8282--   Scanning root segment: 0x701a000..0x701afff (4096)
--8282--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8282--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8282--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8282--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8282--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8282--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8282--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8282== Checked 1,421,936 bytes
==8282== 
==8282== LEAK SUMMARY:
==8282==    definitely lost: 253 bytes in 4 blocks
==8282==    indirectly lost: 6,756 bytes in 7 blocks
==8282==      possibly lost: 0 bytes in 0 blocks
==8282==    still reachable: 1,124,942 bytes in 25,084 blocks
==8282==         suppressed: 0 bytes in 0 blocks
==8282== Rerun with --leak-check=full to see details of leaked memory
==8282== 
==8282== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8282== 
==8282== 1 errors in context 1 of 1:
==8282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8282==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8282==    by 0x488CD0: stringsubst (subst.c:301)
==8282==    by 0x48801B: prefork (subst.c:77)
==8282==    by 0x42B318: execcmd (exec.c:2619)
==8282==    by 0x428CA0: execpline2 (exec.c:1697)
==8282==    by 0x427FD2: execpline (exec.c:1484)
==8282==    by 0x427756: execlist (exec.c:1267)
==8282==    by 0x42717C: execode (exec.c:1073)
==8282==    by 0x431299: runshfunc (exec.c:5040)
==8282==    by 0x430E76: doshfunc (exec.c:4920)
==8282==    by 0x4302FB: execshfunc (exec.c:4557)
==8282==    by 0x42D8C1: execcmd (exec.c:3373)
==8282== 
==8282== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8284== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8284-by-pythonnut-on-???
==8284== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8284-by-pythonnut-on-???
==8284== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8284-by-pythonnut-on-???
==8284== 
==8284== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8284== don't want to do, unless you know exactly what you're doing,
==8284== or are doing some strange experiment):
==8284==   /usr/lib/valgrind/../../bin/vgdb --pid=8284 ...command...
==8284== 
==8284== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8284==   /path/to/gdb ./zsh
==8284== and then give GDB the following command
==8284==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8284
==8284== --pid is optional if only one valgrind process is running
==8284== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8284-- Caught __NR_exit; running __libc_freeres()
--8284-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8284== 
==8284== HEAP SUMMARY:
==8284==     in use at exit: 1,132,259 bytes in 25,096 blocks
==8284==   total heap usage: 652,570 allocs, 627,474 frees, 31,321,123 bytes allocated
==8284== 
==8284== Searching for pointers to 25,096 not-freed blocks
--8284--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8284--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8284--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8284--   Scanning root segment: 0x402a000..0x402efff (20480)
--8284--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8284--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8284--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8284--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8284--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8284--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8284--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8284--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8284--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8284--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8284--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8284--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8284--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8284--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8284--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8284--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8284--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8284--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8284--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8284--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8284--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8284--   Scanning root segment: 0x701a000..0x701afff (4096)
--8284--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8284--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8284--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8284--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8284--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8284--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8284--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8284== Checked 1,422,216 bytes
==8284== 
==8284== LEAK SUMMARY:
==8284==    definitely lost: 253 bytes in 4 blocks
==8284==    indirectly lost: 6,756 bytes in 7 blocks
==8284==      possibly lost: 0 bytes in 0 blocks
==8284==    still reachable: 1,125,250 bytes in 25,085 blocks
==8284==         suppressed: 0 bytes in 0 blocks
==8284== Rerun with --leak-check=full to see details of leaked memory
==8284== 
==8284== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8284== 
==8284== 1 errors in context 1 of 1:
==8284== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8284==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8284==    by 0x488CD0: stringsubst (subst.c:301)
==8284==    by 0x48801B: prefork (subst.c:77)
==8284==    by 0x42B318: execcmd (exec.c:2619)
==8284==    by 0x428CA0: execpline2 (exec.c:1697)
==8284==    by 0x427FD2: execpline (exec.c:1484)
==8284==    by 0x427756: execlist (exec.c:1267)
==8284==    by 0x42717C: execode (exec.c:1073)
==8284==    by 0x431299: runshfunc (exec.c:5040)
==8284==    by 0x430E76: doshfunc (exec.c:4920)
==8284==    by 0x4302FB: execshfunc (exec.c:4557)
==8284==    by 0x42D8C1: execcmd (exec.c:3373)
==8284== 
==8284== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8287== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8287-by-pythonnut-on-???
==8287== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8287-by-pythonnut-on-???
==8287== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8287-by-pythonnut-on-???
==8287== 
==8287== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8287== don't want to do, unless you know exactly what you're doing,
==8287== or are doing some strange experiment):
==8287==   /usr/lib/valgrind/../../bin/vgdb --pid=8287 ...command...
==8287== 
==8287== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8287==   /path/to/gdb ./zsh
==8287== and then give GDB the following command
==8287==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8287
==8287== --pid is optional if only one valgrind process is running
==8287== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8286-- Caught __NR_exit; running __libc_freeres()
==8286== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8286-by-pythonnut-on-???
==8286== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8286-by-pythonnut-on-???
==8286== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8286-by-pythonnut-on-???
==8286== 
==8286== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8286== don't want to do, unless you know exactly what you're doing,
==8286== or are doing some strange experiment):
==8286==   /usr/lib/valgrind/../../bin/vgdb --pid=8286 ...command...
==8286== 
==8286== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8286==   /path/to/gdb ./zsh
==8286== and then give GDB the following command
==8286==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8286
==8286== --pid is optional if only one valgrind process is running
==8286== 
--8286-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8286== 
==8286== HEAP SUMMARY:
==8286==     in use at exit: 1,132,681 bytes in 25,104 blocks
==8286==   total heap usage: 652,672 allocs, 627,568 frees, 31,328,589 bytes allocated
==8286== 
==8286== Searching for pointers to 25,104 not-freed blocks
--8286--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8286--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8286--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8286--   Scanning root segment: 0x402a000..0x402efff (20480)
--8286--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8286--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8286--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8286--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8286--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8286--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8286--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8286--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8286--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8286--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8286--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8286--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8286--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8286--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8286--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8286--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8286--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8286--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8286--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8286--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8286--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8286--   Scanning root segment: 0x701a000..0x701afff (4096)
--8286--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8286--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8286--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8286--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8286--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8286--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8286--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8286== Checked 1,422,600 bytes
==8286== 
==8286== LEAK SUMMARY:
==8286==    definitely lost: 253 bytes in 4 blocks
==8286==    indirectly lost: 6,756 bytes in 7 blocks
==8286==      possibly lost: 0 bytes in 0 blocks
==8286==    still reachable: 1,125,672 bytes in 25,093 blocks
==8286==         suppressed: 0 bytes in 0 blocks
==8286== Rerun with --leak-check=full to see details of leaked memory
==8286== 
==8286== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8286== 
==8286== 1 errors in context 1 of 1:
==8286== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8286==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8286==    by 0x488CD0: stringsubst (subst.c:301)
==8286==    by 0x48801B: prefork (subst.c:77)
==8286==    by 0x42B318: execcmd (exec.c:2619)
==8286==    by 0x428CA0: execpline2 (exec.c:1697)
==8286==    by 0x427FD2: execpline (exec.c:1484)
==8286==    by 0x427756: execlist (exec.c:1267)
==8286==    by 0x42717C: execode (exec.c:1073)
==8286==    by 0x431299: runshfunc (exec.c:5040)
==8286==    by 0x430E76: doshfunc (exec.c:4920)
==8286==    by 0x4302FB: execshfunc (exec.c:4557)
==8286==    by 0x42D8C1: execcmd (exec.c:3373)
==8286== 
==8286== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8288-- Caught __NR_exit; running __libc_freeres()
==8288== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8288-by-pythonnut-on-???
==8288== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8288-by-pythonnut-on-???
==8288== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8288-by-pythonnut-on-???
==8288== 
==8288== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8288== don't want to do, unless you know exactly what you're doing,
==8288== or are doing some strange experiment):
==8288==   /usr/lib/valgrind/../../bin/vgdb --pid=8288 ...command...
==8288== 
==8288== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8288==   /path/to/gdb ./zsh
==8288== and then give GDB the following command
==8288==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8288
==8288== --pid is optional if only one valgrind process is running
==8288== 
--8288-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8288== 
==8288== HEAP SUMMARY:
==8288==     in use at exit: 1,133,042 bytes in 25,118 blocks
==8288==   total heap usage: 652,808 allocs, 627,690 frees, 31,338,338 bytes allocated
==8288== 
==8288== Searching for pointers to 25,118 not-freed blocks
--8288--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8288--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8288--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8288--   Scanning root segment: 0x402a000..0x402efff (20480)
--8288--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8288--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8288--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8288--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8288--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8288--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8288--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8288--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8288--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8288--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8288--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8288--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8288--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8288--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8288--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8288--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8288--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8288--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8288--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8288--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8288--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8288--   Scanning root segment: 0x701a000..0x701afff (4096)
--8288--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8288--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8288--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8288--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8288--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8288--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8288--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8288== Checked 1,422,984 bytes
==8288== 
==8288== LEAK SUMMARY:
==8288==    definitely lost: 253 bytes in 4 blocks
==8288==    indirectly lost: 6,756 bytes in 7 blocks
==8288==      possibly lost: 0 bytes in 0 blocks
==8288==    still reachable: 1,126,033 bytes in 25,107 blocks
==8288==         suppressed: 0 bytes in 0 blocks
==8288== Rerun with --leak-check=full to see details of leaked memory
==8288== 
==8288== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8288== 
==8288== 1 errors in context 1 of 1:
==8288== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8288==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8288==    by 0x488CD0: stringsubst (subst.c:301)
==8288==    by 0x48801B: prefork (subst.c:77)
==8288==    by 0x42B318: execcmd (exec.c:2619)
==8288==    by 0x428CA0: execpline2 (exec.c:1697)
==8288==    by 0x427FD2: execpline (exec.c:1484)
==8288==    by 0x427756: execlist (exec.c:1267)
==8288==    by 0x42717C: execode (exec.c:1073)
==8288==    by 0x431299: runshfunc (exec.c:5040)
==8288==    by 0x430E76: doshfunc (exec.c:4920)
==8288==    by 0x4302FB: execshfunc (exec.c:4557)
==8288==    by 0x42D8C1: execcmd (exec.c:3373)
==8288== 
==8288== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8290== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8290-by-pythonnut-on-???
==8290== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8290-by-pythonnut-on-???
==8290== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8290-by-pythonnut-on-???
==8290== 
==8290== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8290== don't want to do, unless you know exactly what you're doing,
==8290== or are doing some strange experiment):
==8290==   /usr/lib/valgrind/../../bin/vgdb --pid=8290 ...command...
==8290== 
==8290== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8290==   /path/to/gdb ./zsh
==8290== and then give GDB the following command
==8290==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8290
==8290== --pid is optional if only one valgrind process is running
==8290== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8290-- Caught __NR_exit; running __libc_freeres()
--8290-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8290== 
==8290== HEAP SUMMARY:
==8290==     in use at exit: 1,133,318 bytes in 25,119 blocks
==8290==   total heap usage: 652,910 allocs, 627,791 frees, 31,345,902 bytes allocated
==8290== 
==8290== Searching for pointers to 25,119 not-freed blocks
--8290--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8290--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8290--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8290--   Scanning root segment: 0x402a000..0x402efff (20480)
--8290--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8290--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8290--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8290--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8290--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8290--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8290--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8290--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8290--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8290--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8290--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8290--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8290--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8290--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8290--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8290--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8290--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8290--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8290--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8290--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8290--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8290--   Scanning root segment: 0x701a000..0x701afff (4096)
--8290--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8290--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8290--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8290--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8290--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8290--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8290--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8290== Checked 1,423,248 bytes
==8290== 
==8290== LEAK SUMMARY:
==8290==    definitely lost: 253 bytes in 4 blocks
==8290==    indirectly lost: 6,756 bytes in 7 blocks
==8290==      possibly lost: 0 bytes in 0 blocks
==8290==    still reachable: 1,126,309 bytes in 25,108 blocks
==8290==         suppressed: 0 bytes in 0 blocks
==8290== Rerun with --leak-check=full to see details of leaked memory
==8290== 
==8290== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8290== 
==8290== 1 errors in context 1 of 1:
==8290== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8290==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8290==    by 0x488CD0: stringsubst (subst.c:301)
==8290==    by 0x48801B: prefork (subst.c:77)
==8290==    by 0x42B318: execcmd (exec.c:2619)
==8290==    by 0x428CA0: execpline2 (exec.c:1697)
==8290==    by 0x427FD2: execpline (exec.c:1484)
==8290==    by 0x427756: execlist (exec.c:1267)
==8290==    by 0x42717C: execode (exec.c:1073)
==8290==    by 0x431299: runshfunc (exec.c:5040)
==8290==    by 0x430E76: doshfunc (exec.c:4920)
==8290==    by 0x4302FB: execshfunc (exec.c:4557)
==8290==    by 0x42D8C1: execcmd (exec.c:3373)
==8290== 
==8290== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8293== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8293-by-pythonnut-on-???
==8293== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8293-by-pythonnut-on-???
==8293== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8293-by-pythonnut-on-???
==8293== 
==8293== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8293== don't want to do, unless you know exactly what you're doing,
==8293== or are doing some strange experiment):
==8293==   /usr/lib/valgrind/../../bin/vgdb --pid=8293 ...command...
==8293== 
==8293== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8293==   /path/to/gdb ./zsh
==8293== and then give GDB the following command
==8293==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8293
==8293== --pid is optional if only one valgrind process is running
==8293== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
==8292== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8292-by-pythonnut-on-???
==8292== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8292-by-pythonnut-on-???
==8292== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8292-by-pythonnut-on-???
==8292== 
==8292== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8292== don't want to do, unless you know exactly what you're doing,
==8292== or are doing some strange experiment):
==8292==   /usr/lib/valgrind/../../bin/vgdb --pid=8292 ...command...
==8292== 
==8292== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8292==   /path/to/gdb ./zsh
==8292== and then give GDB the following command
==8292==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8292
==8292== --pid is optional if only one valgrind process is running
==8292== 
--8292-- Caught __NR_exit; running __libc_freeres()
--8292-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8292== 
==8292== HEAP SUMMARY:
==8292==     in use at exit: 1,133,889 bytes in 25,135 blocks
==8292==   total heap usage: 653,048 allocs, 627,913 frees, 31,355,820 bytes allocated
==8292== 
==8292== Searching for pointers to 25,135 not-freed blocks
--8292--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8292--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8292--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8292--   Scanning root segment: 0x402a000..0x402efff (20480)
--8292--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8292--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8292--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8292--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8292--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8292--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8292--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8292--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8292--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8292--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8292--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8292--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8292--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8292--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8292--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8292--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8292--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8292--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8292--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8292--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8292--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8292--   Scanning root segment: 0x701a000..0x701afff (4096)
--8292--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8292--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8292--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8292--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8292--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8292--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8292--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8292== Checked 1,423,704 bytes
==8292== 
==8292== LEAK SUMMARY:
==8292==    definitely lost: 253 bytes in 4 blocks
==8292==    indirectly lost: 6,756 bytes in 7 blocks
==8292==      possibly lost: 0 bytes in 0 blocks
==8292==    still reachable: 1,126,880 bytes in 25,124 blocks
==8292==         suppressed: 0 bytes in 0 blocks
==8292== Rerun with --leak-check=full to see details of leaked memory
==8292== 
==8292== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8292== 
==8292== 1 errors in context 1 of 1:
==8292== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8292==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8292==    by 0x488CD0: stringsubst (subst.c:301)
==8292==    by 0x48801B: prefork (subst.c:77)
==8292==    by 0x42B318: execcmd (exec.c:2619)
==8292==    by 0x428CA0: execpline2 (exec.c:1697)
==8292==    by 0x427FD2: execpline (exec.c:1484)
==8292==    by 0x427756: execlist (exec.c:1267)
==8292==    by 0x42717C: execode (exec.c:1073)
==8292==    by 0x431299: runshfunc (exec.c:5040)
==8292==    by 0x430E76: doshfunc (exec.c:4920)
==8292==    by 0x4302FB: execshfunc (exec.c:4557)
==8292==    by 0x42D8C1: execcmd (exec.c:3373)
==8292== 
==8292== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8295== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8295-by-pythonnut-on-???
==8295== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8295-by-pythonnut-on-???
==8295== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8295-by-pythonnut-on-???
==8295== 
==8295== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8295== don't want to do, unless you know exactly what you're doing,
==8295== or are doing some strange experiment):
==8295==   /usr/lib/valgrind/../../bin/vgdb --pid=8295 ...command...
==8295== 
==8295== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8295==   /path/to/gdb ./zsh
==8295== and then give GDB the following command
==8295==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8295
==8295== --pid is optional if only one valgrind process is running
==8295== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8294-- Caught __NR_exit; running __libc_freeres()
==8294== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8294-by-pythonnut-on-???
==8294== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8294-by-pythonnut-on-???
==8294== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8294-by-pythonnut-on-???
==8294== 
==8294== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8294== don't want to do, unless you know exactly what you're doing,
==8294== or are doing some strange experiment):
==8294==   /usr/lib/valgrind/../../bin/vgdb --pid=8294 ...command...
==8294== 
==8294== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8294==   /path/to/gdb ./zsh
==8294== and then give GDB the following command
==8294==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8294
==8294== --pid is optional if only one valgrind process is running
==8294== 
--8294-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8294== 
==8294== HEAP SUMMARY:
==8294==     in use at exit: 1,134,165 bytes in 25,136 blocks
==8294==   total heap usage: 653,151 allocs, 628,015 frees, 31,363,408 bytes allocated
==8294== 
==8294== Searching for pointers to 25,136 not-freed blocks
--8294--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8294--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8294--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8294--   Scanning root segment: 0x402a000..0x402efff (20480)
--8294--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8294--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8294--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8294--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8294--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8294--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8294--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8294--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8294--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8294--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8294--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8294--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8294--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8294--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8294--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8294--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8294--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8294--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8294--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8294--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8294--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8294--   Scanning root segment: 0x701a000..0x701afff (4096)
--8294--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8294--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8294--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8294--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8294--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8294--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8294--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8294== Checked 1,423,968 bytes
==8294== 
==8294== LEAK SUMMARY:
==8294==    definitely lost: 253 bytes in 4 blocks
==8294==    indirectly lost: 6,756 bytes in 7 blocks
==8294==      possibly lost: 0 bytes in 0 blocks
==8294==    still reachable: 1,127,156 bytes in 25,125 blocks
==8294==         suppressed: 0 bytes in 0 blocks
==8294== Rerun with --leak-check=full to see details of leaked memory
==8294== 
==8294== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8294== 
==8294== 1 errors in context 1 of 1:
==8294== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8294==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8294==    by 0x488CD0: stringsubst (subst.c:301)
==8294==    by 0x48801B: prefork (subst.c:77)
==8294==    by 0x42B318: execcmd (exec.c:2619)
==8294==    by 0x428CA0: execpline2 (exec.c:1697)
==8294==    by 0x427FD2: execpline (exec.c:1484)
==8294==    by 0x427756: execlist (exec.c:1267)
==8294==    by 0x42717C: execode (exec.c:1073)
==8294==    by 0x431299: runshfunc (exec.c:5040)
==8294==    by 0x430E76: doshfunc (exec.c:4920)
==8294==    by 0x4302FB: execshfunc (exec.c:4557)
==8294==    by 0x42D8C1: execcmd (exec.c:3373)
==8294== 
==8294== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8296-- Caught __NR_exit; running __libc_freeres()
==8296== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8296-by-pythonnut-on-???
==8296== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8296-by-pythonnut-on-???
==8296== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8296-by-pythonnut-on-???
==8296== 
==8296== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8296== don't want to do, unless you know exactly what you're doing,
==8296== or are doing some strange experiment):
==8296==   /usr/lib/valgrind/../../bin/vgdb --pid=8296 ...command...
==8296== 
==8296== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8296==   /path/to/gdb ./zsh
==8296== and then give GDB the following command
==8296==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8296
==8296== --pid is optional if only one valgrind process is running
==8296== 
--8296-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8296== 
==8296== HEAP SUMMARY:
==8296==     in use at exit: 1,134,587 bytes in 25,144 blocks
==8296==   total heap usage: 653,253 allocs, 628,109 frees, 31,370,874 bytes allocated
==8296== 
==8296== Searching for pointers to 25,144 not-freed blocks
--8296--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8296--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8296--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8296--   Scanning root segment: 0x402a000..0x402efff (20480)
--8296--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8296--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8296--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8296--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8296--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8296--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8296--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8296--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8296--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8296--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8296--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8296--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8296--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8296--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8296--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8296--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8296--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8296--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8296--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8296--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8296--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8296--   Scanning root segment: 0x701a000..0x701afff (4096)
--8296--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8296--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8296--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8296--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8296--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8296--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8296--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8296== Checked 1,424,352 bytes
==8296== 
==8296== LEAK SUMMARY:
==8296==    definitely lost: 253 bytes in 4 blocks
==8296==    indirectly lost: 6,756 bytes in 7 blocks
==8296==      possibly lost: 0 bytes in 0 blocks
==8296==    still reachable: 1,127,578 bytes in 25,133 blocks
==8296==         suppressed: 0 bytes in 0 blocks
==8296== Rerun with --leak-check=full to see details of leaked memory
==8296== 
==8296== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8296== 
==8296== 1 errors in context 1 of 1:
==8296== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8296==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8296==    by 0x488CD0: stringsubst (subst.c:301)
==8296==    by 0x48801B: prefork (subst.c:77)
==8296==    by 0x42B318: execcmd (exec.c:2619)
==8296==    by 0x428CA0: execpline2 (exec.c:1697)
==8296==    by 0x427FD2: execpline (exec.c:1484)
==8296==    by 0x427756: execlist (exec.c:1267)
==8296==    by 0x42717C: execode (exec.c:1073)
==8296==    by 0x431299: runshfunc (exec.c:5040)
==8296==    by 0x430E76: doshfunc (exec.c:4920)
==8296==    by 0x4302FB: execshfunc (exec.c:4557)
==8296==    by 0x42D8C1: execcmd (exec.c:3373)
==8296== 
==8296== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8298-- Caught __NR_exit; running __libc_freeres()
==8298== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8298-by-pythonnut-on-???
==8298== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8298-by-pythonnut-on-???
==8298== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8298-by-pythonnut-on-???
==8298== 
==8298== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8298== don't want to do, unless you know exactly what you're doing,
==8298== or are doing some strange experiment):
==8298==   /usr/lib/valgrind/../../bin/vgdb --pid=8298 ...command...
==8298== 
==8298== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8298==   /path/to/gdb ./zsh
==8298== and then give GDB the following command
==8298==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8298
==8298== --pid is optional if only one valgrind process is running
==8298== 
--8298-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8298== 
==8298== HEAP SUMMARY:
==8298==     in use at exit: 1,135,021 bytes in 25,159 blocks
==8298==   total heap usage: 653,390 allocs, 628,231 frees, 31,380,696 bytes allocated
==8298== 
==8298== Searching for pointers to 25,159 not-freed blocks
--8298--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8298--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8298--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8298--   Scanning root segment: 0x402a000..0x402efff (20480)
--8298--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8298--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8298--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8298--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8298--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8298--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8298--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8298--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8298--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8298--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8298--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8298--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8298--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8298--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8298--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8298--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8298--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8298--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8298--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8298--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8298--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8298--   Scanning root segment: 0x701a000..0x701afff (4096)
--8298--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8298--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8298--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8298--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8298--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8298--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8298--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8298== Checked 1,424,744 bytes
==8298== 
==8298== LEAK SUMMARY:
==8298==    definitely lost: 253 bytes in 4 blocks
==8298==    indirectly lost: 6,756 bytes in 7 blocks
==8298==      possibly lost: 0 bytes in 0 blocks
==8298==    still reachable: 1,128,012 bytes in 25,148 blocks
==8298==         suppressed: 0 bytes in 0 blocks
==8298== Rerun with --leak-check=full to see details of leaked memory
==8298== 
==8298== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8298== 
==8298== 1 errors in context 1 of 1:
==8298== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8298==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8298==    by 0x488CD0: stringsubst (subst.c:301)
==8298==    by 0x48801B: prefork (subst.c:77)
==8298==    by 0x42B318: execcmd (exec.c:2619)
==8298==    by 0x428CA0: execpline2 (exec.c:1697)
==8298==    by 0x427FD2: execpline (exec.c:1484)
==8298==    by 0x427756: execlist (exec.c:1267)
==8298==    by 0x42717C: execode (exec.c:1073)
==8298==    by 0x431299: runshfunc (exec.c:5040)
==8298==    by 0x430E76: doshfunc (exec.c:4920)
==8298==    by 0x4302FB: execshfunc (exec.c:4557)
==8298==    by 0x42D8C1: execcmd (exec.c:3373)
==8298== 
==8298== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8300== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8300-by-pythonnut-on-???
==8300== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8300-by-pythonnut-on-???
==8300== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8300-by-pythonnut-on-???
==8300== 
==8300== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8300== don't want to do, unless you know exactly what you're doing,
==8300== or are doing some strange experiment):
==8300==   /usr/lib/valgrind/../../bin/vgdb --pid=8300 ...command...
==8300== 
==8300== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8300==   /path/to/gdb ./zsh
==8300== and then give GDB the following command
==8300==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8300
==8300== --pid is optional if only one valgrind process is running
==8300== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8300-- Caught __NR_exit; running __libc_freeres()
--8300-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8300== 
==8300== HEAP SUMMARY:
==8300==     in use at exit: 1,135,297 bytes in 25,160 blocks
==8300==   total heap usage: 653,493 allocs, 628,333 frees, 31,388,284 bytes allocated
==8300== 
==8300== Searching for pointers to 25,160 not-freed blocks
--8300--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8300--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8300--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8300--   Scanning root segment: 0x402a000..0x402efff (20480)
--8300--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8300--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8300--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8300--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8300--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8300--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8300--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8300--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8300--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8300--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8300--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8300--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8300--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8300--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8300--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8300--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8300--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8300--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8300--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8300--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8300--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8300--   Scanning root segment: 0x701a000..0x701afff (4096)
--8300--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8300--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8300--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8300--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8300--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8300--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8300--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8300== Checked 1,425,008 bytes
==8300== 
==8300== LEAK SUMMARY:
==8300==    definitely lost: 253 bytes in 4 blocks
==8300==    indirectly lost: 6,756 bytes in 7 blocks
==8300==      possibly lost: 0 bytes in 0 blocks
==8300==    still reachable: 1,128,288 bytes in 25,149 blocks
==8300==         suppressed: 0 bytes in 0 blocks
==8300== Rerun with --leak-check=full to see details of leaked memory
==8300== 
==8300== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8300== 
==8300== 1 errors in context 1 of 1:
==8300== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8300==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8300==    by 0x488CD0: stringsubst (subst.c:301)
==8300==    by 0x48801B: prefork (subst.c:77)
==8300==    by 0x42B318: execcmd (exec.c:2619)
==8300==    by 0x428CA0: execpline2 (exec.c:1697)
==8300==    by 0x427FD2: execpline (exec.c:1484)
==8300==    by 0x427756: execlist (exec.c:1267)
==8300==    by 0x42717C: execode (exec.c:1073)
==8300==    by 0x431299: runshfunc (exec.c:5040)
==8300==    by 0x430E76: doshfunc (exec.c:4920)
==8300==    by 0x4302FB: execshfunc (exec.c:4557)
==8300==    by 0x42D8C1: execcmd (exec.c:3373)
==8300== 
==8300== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8303== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8303-by-pythonnut-on-???
==8303== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8303-by-pythonnut-on-???
==8303== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8303-by-pythonnut-on-???
==8303== 
==8303== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8303== don't want to do, unless you know exactly what you're doing,
==8303== or are doing some strange experiment):
==8303==   /usr/lib/valgrind/../../bin/vgdb --pid=8303 ...command...
==8303== 
==8303== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8303==   /path/to/gdb ./zsh
==8303== and then give GDB the following command
==8303==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8303
==8303== --pid is optional if only one valgrind process is running
==8303== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8302-- Caught __NR_exit; running __libc_freeres()
==8302== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8302-by-pythonnut-on-???
==8302== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8302-by-pythonnut-on-???
==8302== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8302-by-pythonnut-on-???
==8302== 
==8302== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8302== don't want to do, unless you know exactly what you're doing,
==8302== or are doing some strange experiment):
==8302==   /usr/lib/valgrind/../../bin/vgdb --pid=8302 ...command...
==8302== 
==8302== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8302==   /path/to/gdb ./zsh
==8302== and then give GDB the following command
==8302==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8302
==8302== --pid is optional if only one valgrind process is running
==8302== 
--8302-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8302== 
==8302== HEAP SUMMARY:
==8302==     in use at exit: 1,135,719 bytes in 25,168 blocks
==8302==   total heap usage: 653,595 allocs, 628,427 frees, 31,395,750 bytes allocated
==8302== 
==8302== Searching for pointers to 25,168 not-freed blocks
--8302--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8302--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8302--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8302--   Scanning root segment: 0x402a000..0x402efff (20480)
--8302--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8302--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8302--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8302--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8302--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8302--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8302--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8302--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8302--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8302--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8302--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8302--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8302--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8302--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8302--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8302--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8302--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8302--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8302--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8302--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8302--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8302--   Scanning root segment: 0x701a000..0x701afff (4096)
--8302--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8302--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8302--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8302--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8302--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8302--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8302--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8302== Checked 1,425,392 bytes
==8302== 
==8302== LEAK SUMMARY:
==8302==    definitely lost: 253 bytes in 4 blocks
==8302==    indirectly lost: 6,756 bytes in 7 blocks
==8302==      possibly lost: 0 bytes in 0 blocks
==8302==    still reachable: 1,128,710 bytes in 25,157 blocks
==8302==         suppressed: 0 bytes in 0 blocks
==8302== Rerun with --leak-check=full to see details of leaked memory
==8302== 
==8302== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8302== 
==8302== 1 errors in context 1 of 1:
==8302== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8302==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8302==    by 0x488CD0: stringsubst (subst.c:301)
==8302==    by 0x48801B: prefork (subst.c:77)
==8302==    by 0x42B318: execcmd (exec.c:2619)
==8302==    by 0x428CA0: execpline2 (exec.c:1697)
==8302==    by 0x427FD2: execpline (exec.c:1484)
==8302==    by 0x427756: execlist (exec.c:1267)
==8302==    by 0x42717C: execode (exec.c:1073)
==8302==    by 0x431299: runshfunc (exec.c:5040)
==8302==    by 0x430E76: doshfunc (exec.c:4920)
==8302==    by 0x4302FB: execshfunc (exec.c:4557)
==8302==    by 0x42D8C1: execcmd (exec.c:3373)
==8302== 
==8302== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8304== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8304-by-pythonnut-on-???
==8304== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8304-by-pythonnut-on-???
==8304== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8304-by-pythonnut-on-???
==8304== 
==8304== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8304== don't want to do, unless you know exactly what you're doing,
==8304== or are doing some strange experiment):
==8304==   /usr/lib/valgrind/../../bin/vgdb --pid=8304 ...command...
==8304== 
==8304== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8304==   /path/to/gdb ./zsh
==8304== and then give GDB the following command
==8304==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8304
==8304== --pid is optional if only one valgrind process is running
==8304== 
client request: code 4d430005,  addr 0xFFEFF10CC,  len 4
--8304-- Caught __NR_exit; running __libc_freeres()
--8304-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8304== 
==8304== HEAP SUMMARY:
==8304==     in use at exit: 1,135,001 bytes in 25,161 blocks
==8304==   total heap usage: 653,729 allocs, 628,568 frees, 31,408,086 bytes allocated
==8304== 
==8304== Searching for pointers to 25,161 not-freed blocks
--8304--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8304--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8304--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8304--   Scanning root segment: 0x402a000..0x402afff (4096)
--8304--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8304--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8304--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8304--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8304--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8304--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8304--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8304--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8304--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8304--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8304--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8304--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8304--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8304--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8304--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8304--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8304--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8304--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8304--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8304--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8304--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8304--   Scanning root segment: 0x701a000..0x701afff (4096)
--8304--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8304--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8304--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8304--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8304--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8304--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8304--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8304== Checked 1,406,216 bytes
==8304== 
==8304== LEAK SUMMARY:
==8304==    definitely lost: 253 bytes in 4 blocks
==8304==    indirectly lost: 6,756 bytes in 7 blocks
==8304==      possibly lost: 0 bytes in 0 blocks
==8304==    still reachable: 1,127,992 bytes in 25,150 blocks
==8304==         suppressed: 0 bytes in 0 blocks
==8304== Rerun with --leak-check=full to see details of leaked memory
==8304== 
==8304== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8304== 
==8304== 1 errors in context 1 of 1:
==8304== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8304==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8304==    by 0x488CD0: stringsubst (subst.c:301)
==8304==    by 0x48801B: prefork (subst.c:77)
==8304==    by 0x42B318: execcmd (exec.c:2619)
==8304==    by 0x428CA0: execpline2 (exec.c:1697)
==8304==    by 0x427FD2: execpline (exec.c:1484)
==8304==    by 0x427756: execlist (exec.c:1267)
==8304==    by 0x42717C: execode (exec.c:1073)
==8304==    by 0x431299: runshfunc (exec.c:5040)
==8304==    by 0x430E76: doshfunc (exec.c:4920)
==8304==    by 0x4302FB: execshfunc (exec.c:4557)
==8304==    by 0x42D8C1: execcmd (exec.c:3373)
==8304== 
==8304== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8307== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8307-by-pythonnut-on-???
==8307== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8307-by-pythonnut-on-???
==8307== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8307-by-pythonnut-on-???
==8307== 
==8307== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8307== don't want to do, unless you know exactly what you're doing,
==8307== or are doing some strange experiment):
==8307==   /usr/lib/valgrind/../../bin/vgdb --pid=8307 ...command...
==8307== 
==8307== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8307==   /path/to/gdb ./zsh
==8307== and then give GDB the following command
==8307==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8307
==8307== --pid is optional if only one valgrind process is running
==8307== 
client request: code 4d430005,  addr 0xFFEFF10CC,  len 4
--8306-- Caught __NR_exit; running __libc_freeres()
==8306== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8306-by-pythonnut-on-???
==8306== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8306-by-pythonnut-on-???
==8306== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8306-by-pythonnut-on-???
==8306== 
==8306== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8306== don't want to do, unless you know exactly what you're doing,
==8306== or are doing some strange experiment):
==8306==   /usr/lib/valgrind/../../bin/vgdb --pid=8306 ...command...
==8306== 
==8306== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8306==   /path/to/gdb ./zsh
==8306== and then give GDB the following command
==8306==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8306
==8306== --pid is optional if only one valgrind process is running
==8306== 
--8306-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8306== 
==8306== HEAP SUMMARY:
==8306==     in use at exit: 1,135,359 bytes in 25,169 blocks
==8306==   total heap usage: 653,830 allocs, 628,661 frees, 31,415,434 bytes allocated
==8306== 
==8306== Searching for pointers to 25,169 not-freed blocks
--8306--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8306--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8306--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8306--   Scanning root segment: 0x402a000..0x402afff (4096)
--8306--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8306--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8306--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8306--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8306--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8306--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8306--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8306--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8306--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8306--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8306--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8306--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8306--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8306--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8306--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8306--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8306--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8306--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8306--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8306--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8306--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8306--   Scanning root segment: 0x701a000..0x701afff (4096)
--8306--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8306--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8306--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8306--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8306--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8306--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8306--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8306== Checked 1,406,544 bytes
==8306== 
==8306== LEAK SUMMARY:
==8306==    definitely lost: 253 bytes in 4 blocks
==8306==    indirectly lost: 6,756 bytes in 7 blocks
==8306==      possibly lost: 0 bytes in 0 blocks
==8306==    still reachable: 1,128,350 bytes in 25,158 blocks
==8306==         suppressed: 0 bytes in 0 blocks
==8306== Rerun with --leak-check=full to see details of leaked memory
==8306== 
==8306== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8306== 
==8306== 1 errors in context 1 of 1:
==8306== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8306==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8306==    by 0x488CD0: stringsubst (subst.c:301)
==8306==    by 0x48801B: prefork (subst.c:77)
==8306==    by 0x42B318: execcmd (exec.c:2619)
==8306==    by 0x428CA0: execpline2 (exec.c:1697)
==8306==    by 0x427FD2: execpline (exec.c:1484)
==8306==    by 0x427756: execlist (exec.c:1267)
==8306==    by 0x42717C: execode (exec.c:1073)
==8306==    by 0x431299: runshfunc (exec.c:5040)
==8306==    by 0x430E76: doshfunc (exec.c:4920)
==8306==    by 0x4302FB: execshfunc (exec.c:4557)
==8306==    by 0x42D8C1: execcmd (exec.c:3373)
==8306== 
==8306== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF10CC,  len 4
--8308-- Caught __NR_exit; running __libc_freeres()
==8308== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8308-by-pythonnut-on-???
==8308== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8308-by-pythonnut-on-???
==8308== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8308-by-pythonnut-on-???
==8308== 
==8308== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8308== don't want to do, unless you know exactly what you're doing,
==8308== or are doing some strange experiment):
==8308==   /usr/lib/valgrind/../../bin/vgdb --pid=8308 ...command...
==8308== 
==8308== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8308==   /path/to/gdb ./zsh
==8308== and then give GDB the following command
==8308==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8308
==8308== --pid is optional if only one valgrind process is running
==8308== 
--8308-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8308== 
==8308== HEAP SUMMARY:
==8308==     in use at exit: 1,135,717 bytes in 25,177 blocks
==8308==   total heap usage: 653,931 allocs, 628,754 frees, 31,422,782 bytes allocated
==8308== 
==8308== Searching for pointers to 25,177 not-freed blocks
--8308--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8308--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8308--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8308--   Scanning root segment: 0x402a000..0x402afff (4096)
--8308--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8308--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8308--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8308--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8308--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8308--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8308--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8308--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8308--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8308--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8308--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8308--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8308--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8308--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8308--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8308--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8308--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8308--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8308--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8308--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8308--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8308--   Scanning root segment: 0x701a000..0x701afff (4096)
--8308--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8308--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8308--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8308--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8308--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8308--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8308--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8308== Checked 1,406,872 bytes
==8308== 
==8308== LEAK SUMMARY:
==8308==    definitely lost: 253 bytes in 4 blocks
==8308==    indirectly lost: 6,756 bytes in 7 blocks
==8308==      possibly lost: 0 bytes in 0 blocks
==8308==    still reachable: 1,128,708 bytes in 25,166 blocks
==8308==         suppressed: 0 bytes in 0 blocks
==8308== Rerun with --leak-check=full to see details of leaked memory
==8308== 
==8308== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8308== 
==8308== 1 errors in context 1 of 1:
==8308== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8308==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8308==    by 0x488CD0: stringsubst (subst.c:301)
==8308==    by 0x48801B: prefork (subst.c:77)
==8308==    by 0x42B318: execcmd (exec.c:2619)
==8308==    by 0x428CA0: execpline2 (exec.c:1697)
==8308==    by 0x427FD2: execpline (exec.c:1484)
==8308==    by 0x427756: execlist (exec.c:1267)
==8308==    by 0x42717C: execode (exec.c:1073)
==8308==    by 0x431299: runshfunc (exec.c:5040)
==8308==    by 0x430E76: doshfunc (exec.c:4920)
==8308==    by 0x4302FB: execshfunc (exec.c:4557)
==8308==    by 0x42D8C1: execcmd (exec.c:3373)
==8308== 
==8308== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF3F6C,  len 4
--8311-- Caught __NR_exit; running __libc_freeres()
==8311== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8311-by-pythonnut-on-???
==8311== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8311-by-pythonnut-on-???
==8311== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8311-by-pythonnut-on-???
==8311== 
==8311== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8311== don't want to do, unless you know exactly what you're doing,
==8311== or are doing some strange experiment):
==8311==   /usr/lib/valgrind/../../bin/vgdb --pid=8311 ...command...
==8311== 
==8311== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8311==   /path/to/gdb ./zsh
==8311== and then give GDB the following command
==8311==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8311
==8311== --pid is optional if only one valgrind process is running
==8311== 
client request: code 4d430005,  addr 0xFFEFF375C,  len 4
--8311-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8311== 
==8311== HEAP SUMMARY:
==8311==     in use at exit: 1,161,355 bytes in 25,415 blocks
==8311==   total heap usage: 655,635 allocs, 630,220 frees, 31,716,937 bytes allocated
==8311== 
==8311== Searching for pointers to 25,415 not-freed blocks
--8311--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8311--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8311--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8311--   Scanning root segment: 0x402c000..0x402cfff (4096)
--8311--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8311--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8311--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8311--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8311--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8311--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8311--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8311--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8311--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8311--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8311--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8311--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8311--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8311--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8311--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8311--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8311--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8311--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8311--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8311--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8311--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8311--   Scanning root segment: 0x701a000..0x701afff (4096)
--8311--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8311--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8311--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8311--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8311--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8311--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8311--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8311== Checked 1,430,560 bytes
==8311== 
==8311== LEAK SUMMARY:
==8311==    definitely lost: 253 bytes in 4 blocks
==8311==    indirectly lost: 6,756 bytes in 7 blocks
==8311==      possibly lost: 0 bytes in 0 blocks
==8311==    still reachable: 1,154,346 bytes in 25,404 blocks
==8311==         suppressed: 0 bytes in 0 blocks
==8311== Rerun with --leak-check=full to see details of leaked memory
==8311== 
==8311== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8311== 
==8311== 1 errors in context 1 of 1:
==8311== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8311==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8311==    by 0x488CD0: stringsubst (subst.c:301)
==8311==    by 0x48801B: prefork (subst.c:77)
==8311==    by 0x42B318: execcmd (exec.c:2619)
==8311==    by 0x428CA0: execpline2 (exec.c:1697)
==8311==    by 0x427FD2: execpline (exec.c:1484)
==8311==    by 0x427756: execlist (exec.c:1267)
==8311==    by 0x42717C: execode (exec.c:1073)
==8311==    by 0x431299: runshfunc (exec.c:5040)
==8311==    by 0x430E76: doshfunc (exec.c:4920)
==8311==    by 0x4302FB: execshfunc (exec.c:4557)
==8311==    by 0x42D8C1: execcmd (exec.c:3373)
==8311== 
==8311== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8313== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8313-by-pythonnut-on-???
==8313== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8313-by-pythonnut-on-???
==8313== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8313-by-pythonnut-on-???
==8313== 
==8313== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8313== don't want to do, unless you know exactly what you're doing,
==8313== or are doing some strange experiment):
==8313==   /usr/lib/valgrind/../../bin/vgdb --pid=8313 ...command...
==8313== 
==8313== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8313==   /path/to/gdb ./zsh
==8313== and then give GDB the following command
==8313==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8313
==8313== --pid is optional if only one valgrind process is running
==8313== 
--8313-- Caught __NR_exit; running __libc_freeres()
--8313-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8313== 
==8313== HEAP SUMMARY:
==8313==     in use at exit: 1,326,069 bytes in 29,207 blocks
==8313==   total heap usage: 715,401 allocs, 686,194 frees, 38,075,421 bytes allocated
==8313== 
==8313== Searching for pointers to 29,207 not-freed blocks
--8313--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8313--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8313--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8313--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8313--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8313--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8313--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8313--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8313--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8313--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8313--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8313--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8313--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8313--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8313--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8313--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8313--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8313--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8313--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8313--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8313--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8313--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8313--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8313--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8313--   Scanning root segment: 0x701a000..0x701afff (4096)
--8313--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8313--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8313--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8313--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8313--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8313--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8313--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8313== Checked 1,579,368 bytes
==8313== 
==8313== LEAK SUMMARY:
==8313==    definitely lost: 253 bytes in 4 blocks
==8313==    indirectly lost: 6,756 bytes in 7 blocks
==8313==      possibly lost: 0 bytes in 0 blocks
==8313==    still reachable: 1,319,060 bytes in 29,196 blocks
==8313==         suppressed: 0 bytes in 0 blocks
==8313== Rerun with --leak-check=full to see details of leaked memory
==8313== 
==8313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8313== 
==8313== 1 errors in context 1 of 1:
==8313== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8313==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8313==    by 0x488CD0: stringsubst (subst.c:301)
==8313==    by 0x48801B: prefork (subst.c:77)
==8313==    by 0x42B318: execcmd (exec.c:2619)
==8313==    by 0x428CA0: execpline2 (exec.c:1697)
==8313==    by 0x427FD2: execpline (exec.c:1484)
==8313==    by 0x427756: execlist (exec.c:1267)
==8313==    by 0x42717C: execode (exec.c:1073)
==8313==    by 0x431299: runshfunc (exec.c:5040)
==8313==    by 0x430E76: doshfunc (exec.c:4920)
==8313==    by 0x4302FB: execshfunc (exec.c:4557)
==8313==    by 0x42D8C1: execcmd (exec.c:3373)
==8313== 
==8313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8314-- Caught __NR_exit; running __libc_freeres()
==8314== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8314-by-pythonnut-on-???
==8314== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8314-by-pythonnut-on-???
==8314== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8314-by-pythonnut-on-???
==8314== 
==8314== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8314== don't want to do, unless you know exactly what you're doing,
==8314== or are doing some strange experiment):
==8314==   /usr/lib/valgrind/../../bin/vgdb --pid=8314 ...command...
==8314== 
==8314== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8314==   /path/to/gdb ./zsh
==8314== and then give GDB the following command
==8314==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8314
==8314== --pid is optional if only one valgrind process is running
==8314== 
--8314-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8314== 
==8314== HEAP SUMMARY:
==8314==     in use at exit: 1,298,980 bytes in 27,997 blocks
==8314==   total heap usage: 778,783 allocs, 750,786 frees, 44,652,824 bytes allocated
==8314== 
==8314== Searching for pointers to 27,997 not-freed blocks
--8314--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8314--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8314--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8314--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8314--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8314--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8314--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8314--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8314--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8314--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8314--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8314--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8314--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8314--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8314--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8314--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8314--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8314--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8314--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8314--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8314--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8314--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8314--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8314--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8314--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8314--   Scanning root segment: 0x701a000..0x701afff (4096)
--8314--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8314--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8314--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8314--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8314--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8314--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8314--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8314== Checked 1,583,896 bytes
==8314== 
==8314== LEAK SUMMARY:
==8314==    definitely lost: 253 bytes in 4 blocks
==8314==    indirectly lost: 6,756 bytes in 7 blocks
==8314==      possibly lost: 0 bytes in 0 blocks
==8314==    still reachable: 1,291,971 bytes in 27,986 blocks
==8314==         suppressed: 0 bytes in 0 blocks
==8314== Rerun with --leak-check=full to see details of leaked memory
==8314== 
==8314== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8314== 
==8314== 1 errors in context 1 of 1:
==8314== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8314==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8314==    by 0x488CD0: stringsubst (subst.c:301)
==8314==    by 0x48801B: prefork (subst.c:77)
==8314==    by 0x42B318: execcmd (exec.c:2619)
==8314==    by 0x428CA0: execpline2 (exec.c:1697)
==8314==    by 0x427FD2: execpline (exec.c:1484)
==8314==    by 0x427756: execlist (exec.c:1267)
==8314==    by 0x42717C: execode (exec.c:1073)
==8314==    by 0x431299: runshfunc (exec.c:5040)
==8314==    by 0x430E76: doshfunc (exec.c:4920)
==8314==    by 0x4302FB: execshfunc (exec.c:4557)
==8314==    by 0x42D8C1: execcmd (exec.c:3373)
==8314== 
==8314== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8315-- Caught __NR_exit; running __libc_freeres()
==8315== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8315-by-pythonnut-on-???
==8315== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8315-by-pythonnut-on-???
==8315== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8315-by-pythonnut-on-???
==8315== 
==8315== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8315== don't want to do, unless you know exactly what you're doing,
==8315== or are doing some strange experiment):
==8315==   /usr/lib/valgrind/../../bin/vgdb --pid=8315 ...command...
==8315== 
==8315== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8315==   /path/to/gdb ./zsh
==8315== and then give GDB the following command
==8315==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8315
==8315== --pid is optional if only one valgrind process is running
==8315== 
--8315-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8315== 
==8315== HEAP SUMMARY:
==8315==     in use at exit: 1,299,104 bytes in 27,998 blocks
==8315==   total heap usage: 778,890 allocs, 750,892 frees, 45,003,296 bytes allocated
==8315== 
==8315== Searching for pointers to 27,998 not-freed blocks
--8315--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8315--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8315--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8315--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8315--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8315--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8315--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8315--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8315--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8315--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8315--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8315--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8315--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8315--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8315--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8315--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8315--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8315--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8315--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8315--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8315--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8315--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8315--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8315--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8315--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8315--   Scanning root segment: 0x701a000..0x701afff (4096)
--8315--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8315--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8315--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8315--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8315--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8315--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8315--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8315== Checked 1,584,024 bytes
==8315== 
==8315== LEAK SUMMARY:
==8315==    definitely lost: 253 bytes in 4 blocks
==8315==    indirectly lost: 6,756 bytes in 7 blocks
==8315==      possibly lost: 0 bytes in 0 blocks
==8315==    still reachable: 1,292,095 bytes in 27,987 blocks
==8315==         suppressed: 0 bytes in 0 blocks
==8315== Rerun with --leak-check=full to see details of leaked memory
==8315== 
==8315== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8315== 
==8315== 1 errors in context 1 of 1:
==8315== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8315==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8315==    by 0x488CD0: stringsubst (subst.c:301)
==8315==    by 0x48801B: prefork (subst.c:77)
==8315==    by 0x42B318: execcmd (exec.c:2619)
==8315==    by 0x428CA0: execpline2 (exec.c:1697)
==8315==    by 0x427FD2: execpline (exec.c:1484)
==8315==    by 0x427756: execlist (exec.c:1267)
==8315==    by 0x42717C: execode (exec.c:1073)
==8315==    by 0x431299: runshfunc (exec.c:5040)
==8315==    by 0x430E76: doshfunc (exec.c:4920)
==8315==    by 0x4302FB: execshfunc (exec.c:4557)
==8315==    by 0x42D8C1: execcmd (exec.c:3373)
==8315== 
==8315== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8316-- Caught __NR_exit; running __libc_freeres()
==8316== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8316-by-pythonnut-on-???
==8316== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8316-by-pythonnut-on-???
==8316== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8316-by-pythonnut-on-???
==8316== 
==8316== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8316== don't want to do, unless you know exactly what you're doing,
==8316== or are doing some strange experiment):
==8316==   /usr/lib/valgrind/../../bin/vgdb --pid=8316 ...command...
==8316== 
==8316== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8316==   /path/to/gdb ./zsh
==8316== and then give GDB the following command
==8316==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8316
==8316== --pid is optional if only one valgrind process is running
==8316== 
--8316-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8316== 
==8316== HEAP SUMMARY:
==8316==     in use at exit: 1,299,068 bytes in 27,998 blocks
==8316==   total heap usage: 778,996 allocs, 750,998 frees, 45,353,616 bytes allocated
==8316== 
==8316== Searching for pointers to 27,998 not-freed blocks
--8316--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8316--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8316--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8316--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8316--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8316--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8316--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8316--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8316--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8316--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8316--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8316--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8316--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8316--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8316--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8316--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8316--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8316--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8316--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8316--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8316--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8316--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8316--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8316--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8316--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8316--   Scanning root segment: 0x701a000..0x701afff (4096)
--8316--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8316--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8316--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8316--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8316--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8316--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8316--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8316== Checked 1,583,976 bytes
==8316== 
==8316== LEAK SUMMARY:
==8316==    definitely lost: 253 bytes in 4 blocks
==8316==    indirectly lost: 6,756 bytes in 7 blocks
==8316==      possibly lost: 0 bytes in 0 blocks
==8316==    still reachable: 1,292,059 bytes in 27,987 blocks
==8316==         suppressed: 0 bytes in 0 blocks
==8316== Rerun with --leak-check=full to see details of leaked memory
==8316== 
==8316== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8316== 
==8316== 1 errors in context 1 of 1:
==8316== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8316==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8316==    by 0x488CD0: stringsubst (subst.c:301)
==8316==    by 0x48801B: prefork (subst.c:77)
==8316==    by 0x42B318: execcmd (exec.c:2619)
==8316==    by 0x428CA0: execpline2 (exec.c:1697)
==8316==    by 0x427FD2: execpline (exec.c:1484)
==8316==    by 0x427756: execlist (exec.c:1267)
==8316==    by 0x42717C: execode (exec.c:1073)
==8316==    by 0x431299: runshfunc (exec.c:5040)
==8316==    by 0x430E76: doshfunc (exec.c:4920)
==8316==    by 0x4302FB: execshfunc (exec.c:4557)
==8316==    by 0x42D8C1: execcmd (exec.c:3373)
==8316== 
==8316== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8317-- Caught __NR_exit; running __libc_freeres()
==8317== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8317-by-pythonnut-on-???
==8317== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8317-by-pythonnut-on-???
==8317== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8317-by-pythonnut-on-???
==8317== 
==8317== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8317== don't want to do, unless you know exactly what you're doing,
==8317== or are doing some strange experiment):
==8317==   /usr/lib/valgrind/../../bin/vgdb --pid=8317 ...command...
==8317== 
==8317== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8317==   /path/to/gdb ./zsh
==8317== and then give GDB the following command
==8317==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8317
==8317== --pid is optional if only one valgrind process is running
==8317== 
--8317-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8317== 
==8317== HEAP SUMMARY:
==8317==     in use at exit: 1,299,074 bytes in 27,998 blocks
==8317==   total heap usage: 779,102 allocs, 751,104 frees, 45,703,920 bytes allocated
==8317== 
==8317== Searching for pointers to 27,998 not-freed blocks
--8317--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8317--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8317--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8317--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8317--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8317--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8317--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8317--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8317--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8317--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8317--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8317--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8317--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8317--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8317--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8317--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8317--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8317--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8317--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8317--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8317--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8317--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8317--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8317--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8317--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8317--   Scanning root segment: 0x701a000..0x701afff (4096)
--8317--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8317--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8317--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8317--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8317--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8317--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8317--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8317== Checked 1,583,976 bytes
==8317== 
==8317== LEAK SUMMARY:
==8317==    definitely lost: 253 bytes in 4 blocks
==8317==    indirectly lost: 6,756 bytes in 7 blocks
==8317==      possibly lost: 0 bytes in 0 blocks
==8317==    still reachable: 1,292,065 bytes in 27,987 blocks
==8317==         suppressed: 0 bytes in 0 blocks
==8317== Rerun with --leak-check=full to see details of leaked memory
==8317== 
==8317== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8317== 
==8317== 1 errors in context 1 of 1:
==8317== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8317==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8317==    by 0x488CD0: stringsubst (subst.c:301)
==8317==    by 0x48801B: prefork (subst.c:77)
==8317==    by 0x42B318: execcmd (exec.c:2619)
==8317==    by 0x428CA0: execpline2 (exec.c:1697)
==8317==    by 0x427FD2: execpline (exec.c:1484)
==8317==    by 0x427756: execlist (exec.c:1267)
==8317==    by 0x42717C: execode (exec.c:1073)
==8317==    by 0x431299: runshfunc (exec.c:5040)
==8317==    by 0x430E76: doshfunc (exec.c:4920)
==8317==    by 0x4302FB: execshfunc (exec.c:4557)
==8317==    by 0x42D8C1: execcmd (exec.c:3373)
==8317== 
==8317== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8318-- Caught __NR_exit; running __libc_freeres()
==8318== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8318-by-pythonnut-on-???
==8318== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8318-by-pythonnut-on-???
==8318== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8318-by-pythonnut-on-???
==8318== 
==8318== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8318== don't want to do, unless you know exactly what you're doing,
==8318== or are doing some strange experiment):
==8318==   /usr/lib/valgrind/../../bin/vgdb --pid=8318 ...command...
==8318== 
==8318== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8318==   /path/to/gdb ./zsh
==8318== and then give GDB the following command
==8318==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8318
==8318== --pid is optional if only one valgrind process is running
==8318== 
--8318-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8318== 
==8318== HEAP SUMMARY:
==8318==     in use at exit: 1,299,074 bytes in 27,998 blocks
==8318==   total heap usage: 779,208 allocs, 751,210 frees, 46,054,228 bytes allocated
==8318== 
==8318== Searching for pointers to 27,998 not-freed blocks
--8318--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8318--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8318--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8318--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8318--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8318--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8318--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8318--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8318--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8318--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8318--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8318--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8318--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8318--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8318--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8318--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8318--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8318--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8318--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8318--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8318--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8318--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8318--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8318--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8318--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8318--   Scanning root segment: 0x701a000..0x701afff (4096)
--8318--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8318--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8318--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8318--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8318--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8318--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8318--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8318== Checked 1,583,976 bytes
==8318== 
==8318== LEAK SUMMARY:
==8318==    definitely lost: 253 bytes in 4 blocks
==8318==    indirectly lost: 6,756 bytes in 7 blocks
==8318==      possibly lost: 0 bytes in 0 blocks
==8318==    still reachable: 1,292,065 bytes in 27,987 blocks
==8318==         suppressed: 0 bytes in 0 blocks
==8318== Rerun with --leak-check=full to see details of leaked memory
==8318== 
==8318== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8318== 
==8318== 1 errors in context 1 of 1:
==8318== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8318==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8318==    by 0x488CD0: stringsubst (subst.c:301)
==8318==    by 0x48801B: prefork (subst.c:77)
==8318==    by 0x42B318: execcmd (exec.c:2619)
==8318==    by 0x428CA0: execpline2 (exec.c:1697)
==8318==    by 0x427FD2: execpline (exec.c:1484)
==8318==    by 0x427756: execlist (exec.c:1267)
==8318==    by 0x42717C: execode (exec.c:1073)
==8318==    by 0x431299: runshfunc (exec.c:5040)
==8318==    by 0x430E76: doshfunc (exec.c:4920)
==8318==    by 0x4302FB: execshfunc (exec.c:4557)
==8318==    by 0x42D8C1: execcmd (exec.c:3373)
==8318== 
==8318== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8319-- Caught __NR_exit; running __libc_freeres()
==8319== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8319-by-pythonnut-on-???
==8319== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8319-by-pythonnut-on-???
==8319== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8319-by-pythonnut-on-???
==8319== 
==8319== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8319== don't want to do, unless you know exactly what you're doing,
==8319== or are doing some strange experiment):
==8319==   /usr/lib/valgrind/../../bin/vgdb --pid=8319 ...command...
==8319== 
==8319== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8319==   /path/to/gdb ./zsh
==8319== and then give GDB the following command
==8319==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8319
==8319== --pid is optional if only one valgrind process is running
==8319== 
--8319-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8319== 
==8319== HEAP SUMMARY:
==8319==     in use at exit: 1,299,164 bytes in 27,998 blocks
==8319==   total heap usage: 779,314 allocs, 751,316 frees, 46,404,656 bytes allocated
==8319== 
==8319== Searching for pointers to 27,998 not-freed blocks
--8319--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8319--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8319--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8319--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8319--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8319--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8319--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8319--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8319--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8319--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8319--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8319--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8319--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8319--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8319--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8319--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8319--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8319--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8319--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8319--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8319--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8319--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8319--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8319--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8319--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8319--   Scanning root segment: 0x701a000..0x701afff (4096)
--8319--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8319--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8319--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8319--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8319--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8319--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8319--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8319== Checked 1,584,064 bytes
==8319== 
==8319== LEAK SUMMARY:
==8319==    definitely lost: 253 bytes in 4 blocks
==8319==    indirectly lost: 6,756 bytes in 7 blocks
==8319==      possibly lost: 0 bytes in 0 blocks
==8319==    still reachable: 1,292,155 bytes in 27,987 blocks
==8319==         suppressed: 0 bytes in 0 blocks
==8319== Rerun with --leak-check=full to see details of leaked memory
==8319== 
==8319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8319== 
==8319== 1 errors in context 1 of 1:
==8319== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8319==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8319==    by 0x488CD0: stringsubst (subst.c:301)
==8319==    by 0x48801B: prefork (subst.c:77)
==8319==    by 0x42B318: execcmd (exec.c:2619)
==8319==    by 0x428CA0: execpline2 (exec.c:1697)
==8319==    by 0x427FD2: execpline (exec.c:1484)
==8319==    by 0x427756: execlist (exec.c:1267)
==8319==    by 0x42717C: execode (exec.c:1073)
==8319==    by 0x431299: runshfunc (exec.c:5040)
==8319==    by 0x430E76: doshfunc (exec.c:4920)
==8319==    by 0x4302FB: execshfunc (exec.c:4557)
==8319==    by 0x42D8C1: execcmd (exec.c:3373)
==8319== 
==8319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8320== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8320-by-pythonnut-on-???
==8320== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8320-by-pythonnut-on-???
==8320== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8320-by-pythonnut-on-???
==8320== 
==8320== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8320== don't want to do, unless you know exactly what you're doing,
==8320== or are doing some strange experiment):
==8320==   /usr/lib/valgrind/../../bin/vgdb --pid=8320 ...command...
==8320== 
==8320== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8320==   /path/to/gdb ./zsh
==8320== and then give GDB the following command
==8320==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8320
==8320== --pid is optional if only one valgrind process is running
==8320== 
--8320-- Caught __NR_exit; running __libc_freeres()
--8320-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8320== 
==8320== HEAP SUMMARY:
==8320==     in use at exit: 1,299,092 bytes in 27,998 blocks
==8320==   total heap usage: 779,420 allocs, 751,422 frees, 46,755,048 bytes allocated
==8320== 
==8320== Searching for pointers to 27,998 not-freed blocks
--8320--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8320--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8320--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8320--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8320--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8320--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8320--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8320--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8320--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8320--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8320--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8320--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8320--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8320--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8320--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8320--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8320--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8320--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8320--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8320--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8320--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8320--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8320--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8320--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8320--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8320--   Scanning root segment: 0x701a000..0x701afff (4096)
--8320--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8320--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8320--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8320--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8320--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8320--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8320--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8320== Checked 1,583,992 bytes
==8320== 
==8320== LEAK SUMMARY:
==8320==    definitely lost: 253 bytes in 4 blocks
==8320==    indirectly lost: 6,756 bytes in 7 blocks
==8320==      possibly lost: 0 bytes in 0 blocks
==8320==    still reachable: 1,292,083 bytes in 27,987 blocks
==8320==         suppressed: 0 bytes in 0 blocks
==8320== Rerun with --leak-check=full to see details of leaked memory
==8320== 
==8320== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8320== 
==8320== 1 errors in context 1 of 1:
==8320== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8320==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8320==    by 0x488CD0: stringsubst (subst.c:301)
==8320==    by 0x48801B: prefork (subst.c:77)
==8320==    by 0x42B318: execcmd (exec.c:2619)
==8320==    by 0x428CA0: execpline2 (exec.c:1697)
==8320==    by 0x427FD2: execpline (exec.c:1484)
==8320==    by 0x427756: execlist (exec.c:1267)
==8320==    by 0x42717C: execode (exec.c:1073)
==8320==    by 0x431299: runshfunc (exec.c:5040)
==8320==    by 0x430E76: doshfunc (exec.c:4920)
==8320==    by 0x4302FB: execshfunc (exec.c:4557)
==8320==    by 0x42D8C1: execcmd (exec.c:3373)
==8320== 
==8320== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8321-- Caught __NR_exit; running __libc_freeres()
==8321== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8321-by-pythonnut-on-???
==8321== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8321-by-pythonnut-on-???
==8321== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8321-by-pythonnut-on-???
==8321== 
==8321== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8321== don't want to do, unless you know exactly what you're doing,
==8321== or are doing some strange experiment):
==8321==   /usr/lib/valgrind/../../bin/vgdb --pid=8321 ...command...
==8321== 
==8321== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8321==   /path/to/gdb ./zsh
==8321== and then give GDB the following command
==8321==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8321
==8321== --pid is optional if only one valgrind process is running
==8321== 
--8321-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8321== 
==8321== HEAP SUMMARY:
==8321==     in use at exit: 1,299,092 bytes in 27,998 blocks
==8321==   total heap usage: 779,526 allocs, 751,528 frees, 47,105,392 bytes allocated
==8321== 
==8321== Searching for pointers to 27,998 not-freed blocks
--8321--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8321--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8321--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8321--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8321--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8321--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8321--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8321--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8321--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8321--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8321--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8321--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8321--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8321--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8321--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8321--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8321--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8321--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8321--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8321--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8321--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8321--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8321--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8321--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8321--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8321--   Scanning root segment: 0x701a000..0x701afff (4096)
--8321--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8321--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8321--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8321--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8321--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8321--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8321--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8321== Checked 1,583,992 bytes
==8321== 
==8321== LEAK SUMMARY:
==8321==    definitely lost: 253 bytes in 4 blocks
==8321==    indirectly lost: 6,756 bytes in 7 blocks
==8321==      possibly lost: 0 bytes in 0 blocks
==8321==    still reachable: 1,292,083 bytes in 27,987 blocks
==8321==         suppressed: 0 bytes in 0 blocks
==8321== Rerun with --leak-check=full to see details of leaked memory
==8321== 
==8321== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8321== 
==8321== 1 errors in context 1 of 1:
==8321== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8321==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8321==    by 0x488CD0: stringsubst (subst.c:301)
==8321==    by 0x48801B: prefork (subst.c:77)
==8321==    by 0x42B318: execcmd (exec.c:2619)
==8321==    by 0x428CA0: execpline2 (exec.c:1697)
==8321==    by 0x427FD2: execpline (exec.c:1484)
==8321==    by 0x427756: execlist (exec.c:1267)
==8321==    by 0x42717C: execode (exec.c:1073)
==8321==    by 0x431299: runshfunc (exec.c:5040)
==8321==    by 0x430E76: doshfunc (exec.c:4920)
==8321==    by 0x4302FB: execshfunc (exec.c:4557)
==8321==    by 0x42D8C1: execcmd (exec.c:3373)
==8321== 
==8321== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8322-- Caught __NR_exit; running __libc_freeres()
==8322== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8322-by-pythonnut-on-???
==8322== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8322-by-pythonnut-on-???
==8322== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8322-by-pythonnut-on-???
==8322== 
==8322== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8322== don't want to do, unless you know exactly what you're doing,
==8322== or are doing some strange experiment):
==8322==   /usr/lib/valgrind/../../bin/vgdb --pid=8322 ...command...
==8322== 
==8322== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8322==   /path/to/gdb ./zsh
==8322== and then give GDB the following command
==8322==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8322
==8322== --pid is optional if only one valgrind process is running
==8322== 
--8322-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8322== 
==8322== HEAP SUMMARY:
==8322==     in use at exit: 1,299,068 bytes in 27,998 blocks
==8322==   total heap usage: 779,632 allocs, 751,634 frees, 47,455,718 bytes allocated
==8322== 
==8322== Searching for pointers to 27,998 not-freed blocks
--8322--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8322--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8322--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8322--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8322--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8322--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8322--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8322--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8322--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8322--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8322--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8322--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8322--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8322--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8322--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8322--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8322--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8322--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8322--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8322--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8322--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8322--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8322--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8322--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8322--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8322--   Scanning root segment: 0x701a000..0x701afff (4096)
--8322--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8322--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8322--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8322--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8322--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8322--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8322--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8322== Checked 1,583,976 bytes
==8322== 
==8322== LEAK SUMMARY:
==8322==    definitely lost: 253 bytes in 4 blocks
==8322==    indirectly lost: 6,756 bytes in 7 blocks
==8322==      possibly lost: 0 bytes in 0 blocks
==8322==    still reachable: 1,292,059 bytes in 27,987 blocks
==8322==         suppressed: 0 bytes in 0 blocks
==8322== Rerun with --leak-check=full to see details of leaked memory
==8322== 
==8322== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8322== 
==8322== 1 errors in context 1 of 1:
==8322== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8322==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8322==    by 0x488CD0: stringsubst (subst.c:301)
==8322==    by 0x48801B: prefork (subst.c:77)
==8322==    by 0x42B318: execcmd (exec.c:2619)
==8322==    by 0x428CA0: execpline2 (exec.c:1697)
==8322==    by 0x427FD2: execpline (exec.c:1484)
==8322==    by 0x427756: execlist (exec.c:1267)
==8322==    by 0x42717C: execode (exec.c:1073)
==8322==    by 0x431299: runshfunc (exec.c:5040)
==8322==    by 0x430E76: doshfunc (exec.c:4920)
==8322==    by 0x4302FB: execshfunc (exec.c:4557)
==8322==    by 0x42D8C1: execcmd (exec.c:3373)
==8322== 
==8322== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8323-- Caught __NR_exit; running __libc_freeres()
==8323== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8323-by-pythonnut-on-???
==8323== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8323-by-pythonnut-on-???
==8323== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8323-by-pythonnut-on-???
==8323== 
==8323== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8323== don't want to do, unless you know exactly what you're doing,
==8323== or are doing some strange experiment):
==8323==   /usr/lib/valgrind/../../bin/vgdb --pid=8323 ...command...
==8323== 
==8323== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8323==   /path/to/gdb ./zsh
==8323== and then give GDB the following command
==8323==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8323
==8323== --pid is optional if only one valgrind process is running
==8323== 
--8323-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8323== 
==8323== HEAP SUMMARY:
==8323==     in use at exit: 1,299,140 bytes in 27,998 blocks
==8323==   total heap usage: 779,738 allocs, 751,740 frees, 47,806,110 bytes allocated
==8323== 
==8323== Searching for pointers to 27,998 not-freed blocks
--8323--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8323--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8323--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8323--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8323--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8323--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8323--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8323--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8323--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8323--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8323--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8323--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8323--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8323--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8323--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8323--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8323--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8323--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8323--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8323--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8323--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8323--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8323--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8323--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8323--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8323--   Scanning root segment: 0x701a000..0x701afff (4096)
--8323--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8323--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8323--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8323--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8323--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8323--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8323--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8323== Checked 1,584,040 bytes
==8323== 
==8323== LEAK SUMMARY:
==8323==    definitely lost: 253 bytes in 4 blocks
==8323==    indirectly lost: 6,756 bytes in 7 blocks
==8323==      possibly lost: 0 bytes in 0 blocks
==8323==    still reachable: 1,292,131 bytes in 27,987 blocks
==8323==         suppressed: 0 bytes in 0 blocks
==8323== Rerun with --leak-check=full to see details of leaked memory
==8323== 
==8323== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8323== 
==8323== 1 errors in context 1 of 1:
==8323== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8323==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8323==    by 0x488CD0: stringsubst (subst.c:301)
==8323==    by 0x48801B: prefork (subst.c:77)
==8323==    by 0x42B318: execcmd (exec.c:2619)
==8323==    by 0x428CA0: execpline2 (exec.c:1697)
==8323==    by 0x427FD2: execpline (exec.c:1484)
==8323==    by 0x427756: execlist (exec.c:1267)
==8323==    by 0x42717C: execode (exec.c:1073)
==8323==    by 0x431299: runshfunc (exec.c:5040)
==8323==    by 0x430E76: doshfunc (exec.c:4920)
==8323==    by 0x4302FB: execshfunc (exec.c:4557)
==8323==    by 0x42D8C1: execcmd (exec.c:3373)
==8323== 
==8323== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8324-- Caught __NR_exit; running __libc_freeres()
==8324== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8324-by-pythonnut-on-???
==8324== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8324-by-pythonnut-on-???
==8324== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8324-by-pythonnut-on-???
==8324== 
==8324== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8324== don't want to do, unless you know exactly what you're doing,
==8324== or are doing some strange experiment):
==8324==   /usr/lib/valgrind/../../bin/vgdb --pid=8324 ...command...
==8324== 
==8324== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8324==   /path/to/gdb ./zsh
==8324== and then give GDB the following command
==8324==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8324
==8324== --pid is optional if only one valgrind process is running
==8324== 
--8324-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8324== 
==8324== HEAP SUMMARY:
==8324==     in use at exit: 1,299,134 bytes in 27,998 blocks
==8324==   total heap usage: 779,844 allocs, 751,846 frees, 48,156,542 bytes allocated
==8324== 
==8324== Searching for pointers to 27,998 not-freed blocks
--8324--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8324--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8324--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8324--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8324--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8324--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8324--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8324--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8324--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8324--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8324--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8324--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8324--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8324--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8324--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8324--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8324--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8324--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8324--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8324--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8324--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8324--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8324--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8324--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8324--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8324--   Scanning root segment: 0x701a000..0x701afff (4096)
--8324--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8324--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8324--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8324--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8324--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8324--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8324--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8324== Checked 1,584,040 bytes
==8324== 
==8324== LEAK SUMMARY:
==8324==    definitely lost: 253 bytes in 4 blocks
==8324==    indirectly lost: 6,756 bytes in 7 blocks
==8324==      possibly lost: 0 bytes in 0 blocks
==8324==    still reachable: 1,292,125 bytes in 27,987 blocks
==8324==         suppressed: 0 bytes in 0 blocks
==8324== Rerun with --leak-check=full to see details of leaked memory
==8324== 
==8324== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8324== 
==8324== 1 errors in context 1 of 1:
==8324== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8324==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8324==    by 0x488CD0: stringsubst (subst.c:301)
==8324==    by 0x48801B: prefork (subst.c:77)
==8324==    by 0x42B318: execcmd (exec.c:2619)
==8324==    by 0x428CA0: execpline2 (exec.c:1697)
==8324==    by 0x427FD2: execpline (exec.c:1484)
==8324==    by 0x427756: execlist (exec.c:1267)
==8324==    by 0x42717C: execode (exec.c:1073)
==8324==    by 0x431299: runshfunc (exec.c:5040)
==8324==    by 0x430E76: doshfunc (exec.c:4920)
==8324==    by 0x4302FB: execshfunc (exec.c:4557)
==8324==    by 0x42D8C1: execcmd (exec.c:3373)
==8324== 
==8324== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8325-- Caught __NR_exit; running __libc_freeres()
==8325== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8325-by-pythonnut-on-???
==8325== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8325-by-pythonnut-on-???
==8325== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8325-by-pythonnut-on-???
==8325== 
==8325== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8325== don't want to do, unless you know exactly what you're doing,
==8325== or are doing some strange experiment):
==8325==   /usr/lib/valgrind/../../bin/vgdb --pid=8325 ...command...
==8325== 
==8325== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8325==   /path/to/gdb ./zsh
==8325== and then give GDB the following command
==8325==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8325
==8325== --pid is optional if only one valgrind process is running
==8325== 
--8325-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8325== 
==8325== HEAP SUMMARY:
==8325==     in use at exit: 1,299,140 bytes in 27,998 blocks
==8325==   total heap usage: 779,950 allocs, 751,952 frees, 48,506,978 bytes allocated
==8325== 
==8325== Searching for pointers to 27,998 not-freed blocks
--8325--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8325--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8325--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8325--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8325--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8325--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8325--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8325--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8325--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8325--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8325--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8325--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8325--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8325--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8325--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8325--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8325--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8325--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8325--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8325--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8325--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8325--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8325--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8325--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8325--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8325--   Scanning root segment: 0x701a000..0x701afff (4096)
--8325--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8325--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8325--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8325--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8325--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8325--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8325--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8325== Checked 1,584,040 bytes
==8325== 
==8325== LEAK SUMMARY:
==8325==    definitely lost: 253 bytes in 4 blocks
==8325==    indirectly lost: 6,756 bytes in 7 blocks
==8325==      possibly lost: 0 bytes in 0 blocks
==8325==    still reachable: 1,292,131 bytes in 27,987 blocks
==8325==         suppressed: 0 bytes in 0 blocks
==8325== Rerun with --leak-check=full to see details of leaked memory
==8325== 
==8325== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8325== 
==8325== 1 errors in context 1 of 1:
==8325== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8325==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8325==    by 0x488CD0: stringsubst (subst.c:301)
==8325==    by 0x48801B: prefork (subst.c:77)
==8325==    by 0x42B318: execcmd (exec.c:2619)
==8325==    by 0x428CA0: execpline2 (exec.c:1697)
==8325==    by 0x427FD2: execpline (exec.c:1484)
==8325==    by 0x427756: execlist (exec.c:1267)
==8325==    by 0x42717C: execode (exec.c:1073)
==8325==    by 0x431299: runshfunc (exec.c:5040)
==8325==    by 0x430E76: doshfunc (exec.c:4920)
==8325==    by 0x4302FB: execshfunc (exec.c:4557)
==8325==    by 0x42D8C1: execcmd (exec.c:3373)
==8325== 
==8325== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8326-- Caught __NR_exit; running __libc_freeres()
==8326== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8326-by-pythonnut-on-???
==8326== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8326-by-pythonnut-on-???
==8326== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8326-by-pythonnut-on-???
==8326== 
==8326== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8326== don't want to do, unless you know exactly what you're doing,
==8326== or are doing some strange experiment):
==8326==   /usr/lib/valgrind/../../bin/vgdb --pid=8326 ...command...
==8326== 
==8326== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8326==   /path/to/gdb ./zsh
==8326== and then give GDB the following command
==8326==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8326
==8326== --pid is optional if only one valgrind process is running
==8326== 
--8326-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8326== 
==8326== HEAP SUMMARY:
==8326==     in use at exit: 1,299,092 bytes in 27,998 blocks
==8326==   total heap usage: 780,056 allocs, 752,058 frees, 48,857,368 bytes allocated
==8326== 
==8326== Searching for pointers to 27,998 not-freed blocks
--8326--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8326--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8326--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8326--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8326--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8326--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8326--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8326--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8326--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8326--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8326--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8326--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8326--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8326--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8326--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8326--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8326--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8326--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8326--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8326--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8326--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8326--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8326--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8326--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8326--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8326--   Scanning root segment: 0x701a000..0x701afff (4096)
--8326--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8326--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8326--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8326--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8326--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8326--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8326--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8326== Checked 1,583,976 bytes
==8326== 
==8326== LEAK SUMMARY:
==8326==    definitely lost: 253 bytes in 4 blocks
==8326==    indirectly lost: 6,756 bytes in 7 blocks
==8326==      possibly lost: 0 bytes in 0 blocks
==8326==    still reachable: 1,292,083 bytes in 27,987 blocks
==8326==         suppressed: 0 bytes in 0 blocks
==8326== Rerun with --leak-check=full to see details of leaked memory
==8326== 
==8326== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8326== 
==8326== 1 errors in context 1 of 1:
==8326== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8326==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8326==    by 0x488CD0: stringsubst (subst.c:301)
==8326==    by 0x48801B: prefork (subst.c:77)
==8326==    by 0x42B318: execcmd (exec.c:2619)
==8326==    by 0x428CA0: execpline2 (exec.c:1697)
==8326==    by 0x427FD2: execpline (exec.c:1484)
==8326==    by 0x427756: execlist (exec.c:1267)
==8326==    by 0x42717C: execode (exec.c:1073)
==8326==    by 0x431299: runshfunc (exec.c:5040)
==8326==    by 0x430E76: doshfunc (exec.c:4920)
==8326==    by 0x4302FB: execshfunc (exec.c:4557)
==8326==    by 0x42D8C1: execcmd (exec.c:3373)
==8326== 
==8326== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8327-- Caught __NR_exit; running __libc_freeres()
==8327== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8327-by-pythonnut-on-???
==8327== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8327-by-pythonnut-on-???
==8327== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8327-by-pythonnut-on-???
==8327== 
==8327== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8327== don't want to do, unless you know exactly what you're doing,
==8327== or are doing some strange experiment):
==8327==   /usr/lib/valgrind/../../bin/vgdb --pid=8327 ...command...
==8327== 
==8327== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8327==   /path/to/gdb ./zsh
==8327== and then give GDB the following command
==8327==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8327
==8327== --pid is optional if only one valgrind process is running
==8327== 
--8327-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8327== 
==8327== HEAP SUMMARY:
==8327==     in use at exit: 1,299,146 bytes in 27,998 blocks
==8327==   total heap usage: 780,162 allocs, 752,164 frees, 49,207,784 bytes allocated
==8327== 
==8327== Searching for pointers to 27,998 not-freed blocks
--8327--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8327--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8327--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8327--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8327--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8327--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8327--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8327--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8327--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8327--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8327--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8327--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8327--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8327--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8327--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8327--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8327--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8327--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8327--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8327--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8327--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8327--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8327--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8327--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8327--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8327--   Scanning root segment: 0x701a000..0x701afff (4096)
--8327--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8327--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8327--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8327--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8327--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8327--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8327--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8327== Checked 1,584,048 bytes
==8327== 
==8327== LEAK SUMMARY:
==8327==    definitely lost: 253 bytes in 4 blocks
==8327==    indirectly lost: 6,756 bytes in 7 blocks
==8327==      possibly lost: 0 bytes in 0 blocks
==8327==    still reachable: 1,292,137 bytes in 27,987 blocks
==8327==         suppressed: 0 bytes in 0 blocks
==8327== Rerun with --leak-check=full to see details of leaked memory
==8327== 
==8327== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8327== 
==8327== 1 errors in context 1 of 1:
==8327== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8327==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8327==    by 0x488CD0: stringsubst (subst.c:301)
==8327==    by 0x48801B: prefork (subst.c:77)
==8327==    by 0x42B318: execcmd (exec.c:2619)
==8327==    by 0x428CA0: execpline2 (exec.c:1697)
==8327==    by 0x427FD2: execpline (exec.c:1484)
==8327==    by 0x427756: execlist (exec.c:1267)
==8327==    by 0x42717C: execode (exec.c:1073)
==8327==    by 0x431299: runshfunc (exec.c:5040)
==8327==    by 0x430E76: doshfunc (exec.c:4920)
==8327==    by 0x4302FB: execshfunc (exec.c:4557)
==8327==    by 0x42D8C1: execcmd (exec.c:3373)
==8327== 
==8327== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8328== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8328-by-pythonnut-on-???
==8328== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8328-by-pythonnut-on-???
==8328== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8328-by-pythonnut-on-???
==8328== 
==8328== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8328== don't want to do, unless you know exactly what you're doing,
==8328== or are doing some strange experiment):
==8328==   /usr/lib/valgrind/../../bin/vgdb --pid=8328 ...command...
==8328== 
==8328== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8328==   /path/to/gdb ./zsh
==8328== and then give GDB the following command
==8328==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8328
==8328== --pid is optional if only one valgrind process is running
==8328== 
--8328-- Caught __NR_exit; running __libc_freeres()
--8328-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8328== 
==8328== HEAP SUMMARY:
==8328==     in use at exit: 1,299,080 bytes in 27,998 blocks
==8328==   total heap usage: 780,268 allocs, 752,270 frees, 49,558,162 bytes allocated
==8328== 
==8328== Searching for pointers to 27,998 not-freed blocks
--8328--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8328--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8328--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8328--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8328--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8328--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8328--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8328--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8328--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8328--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8328--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8328--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8328--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8328--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8328--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8328--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8328--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8328--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8328--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8328--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8328--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8328--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8328--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8328--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8328--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8328--   Scanning root segment: 0x701a000..0x701afff (4096)
--8328--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8328--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8328--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8328--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8328--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8328--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8328--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8328== Checked 1,583,968 bytes
==8328== 
==8328== LEAK SUMMARY:
==8328==    definitely lost: 253 bytes in 4 blocks
==8328==    indirectly lost: 6,756 bytes in 7 blocks
==8328==      possibly lost: 0 bytes in 0 blocks
==8328==    still reachable: 1,292,071 bytes in 27,987 blocks
==8328==         suppressed: 0 bytes in 0 blocks
==8328== Rerun with --leak-check=full to see details of leaked memory
==8328== 
==8328== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8328== 
==8328== 1 errors in context 1 of 1:
==8328== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8328==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8328==    by 0x488CD0: stringsubst (subst.c:301)
==8328==    by 0x48801B: prefork (subst.c:77)
==8328==    by 0x42B318: execcmd (exec.c:2619)
==8328==    by 0x428CA0: execpline2 (exec.c:1697)
==8328==    by 0x427FD2: execpline (exec.c:1484)
==8328==    by 0x427756: execlist (exec.c:1267)
==8328==    by 0x42717C: execode (exec.c:1073)
==8328==    by 0x431299: runshfunc (exec.c:5040)
==8328==    by 0x430E76: doshfunc (exec.c:4920)
==8328==    by 0x4302FB: execshfunc (exec.c:4557)
==8328==    by 0x42D8C1: execcmd (exec.c:3373)
==8328== 
==8328== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8329== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8329-by-pythonnut-on-???
==8329== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8329-by-pythonnut-on-???
==8329== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8329-by-pythonnut-on-???
==8329== 
==8329== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8329== don't want to do, unless you know exactly what you're doing,
==8329== or are doing some strange experiment):
==8329==   /usr/lib/valgrind/../../bin/vgdb --pid=8329 ...command...
==8329== 
==8329== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8329==   /path/to/gdb ./zsh
==8329== and then give GDB the following command
==8329==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8329
==8329== --pid is optional if only one valgrind process is running
==8329== 
--8329-- Caught __NR_exit; running __libc_freeres()
--8329-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8329== 
==8329== HEAP SUMMARY:
==8329==     in use at exit: 1,299,086 bytes in 27,998 blocks
==8329==   total heap usage: 780,374 allocs, 752,376 frees, 49,908,490 bytes allocated
==8329== 
==8329== Searching for pointers to 27,998 not-freed blocks
--8329--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8329--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8329--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8329--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8329--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8329--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8329--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8329--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8329--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8329--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8329--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8329--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8329--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8329--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8329--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8329--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8329--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8329--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8329--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8329--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8329--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8329--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8329--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8329--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8329--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8329--   Scanning root segment: 0x701a000..0x701afff (4096)
--8329--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8329--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8329--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8329--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8329--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8329--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8329--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8329== Checked 1,583,968 bytes
==8329== 
==8329== LEAK SUMMARY:
==8329==    definitely lost: 253 bytes in 4 blocks
==8329==    indirectly lost: 6,756 bytes in 7 blocks
==8329==      possibly lost: 0 bytes in 0 blocks
==8329==    still reachable: 1,292,077 bytes in 27,987 blocks
==8329==         suppressed: 0 bytes in 0 blocks
==8329== Rerun with --leak-check=full to see details of leaked memory
==8329== 
==8329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8329== 
==8329== 1 errors in context 1 of 1:
==8329== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8329==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8329==    by 0x488CD0: stringsubst (subst.c:301)
==8329==    by 0x48801B: prefork (subst.c:77)
==8329==    by 0x42B318: execcmd (exec.c:2619)
==8329==    by 0x428CA0: execpline2 (exec.c:1697)
==8329==    by 0x427FD2: execpline (exec.c:1484)
==8329==    by 0x427756: execlist (exec.c:1267)
==8329==    by 0x42717C: execode (exec.c:1073)
==8329==    by 0x431299: runshfunc (exec.c:5040)
==8329==    by 0x430E76: doshfunc (exec.c:4920)
==8329==    by 0x4302FB: execshfunc (exec.c:4557)
==8329==    by 0x42D8C1: execcmd (exec.c:3373)
==8329== 
==8329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8330-- Caught __NR_exit; running __libc_freeres()
==8330== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8330-by-pythonnut-on-???
==8330== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8330-by-pythonnut-on-???
==8330== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8330-by-pythonnut-on-???
==8330== 
==8330== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8330== don't want to do, unless you know exactly what you're doing,
==8330== or are doing some strange experiment):
==8330==   /usr/lib/valgrind/../../bin/vgdb --pid=8330 ...command...
==8330== 
==8330== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8330==   /path/to/gdb ./zsh
==8330== and then give GDB the following command
==8330==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8330
==8330== --pid is optional if only one valgrind process is running
==8330== 
--8330-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8330== 
==8330== HEAP SUMMARY:
==8330==     in use at exit: 1,299,068 bytes in 27,998 blocks
==8330==   total heap usage: 780,480 allocs, 752,482 frees, 50,258,812 bytes allocated
==8330== 
==8330== Searching for pointers to 27,998 not-freed blocks
--8330--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8330--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8330--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8330--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8330--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8330--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8330--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8330--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8330--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8330--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8330--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8330--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8330--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8330--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8330--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8330--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8330--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8330--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8330--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8330--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8330--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8330--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8330--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8330--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8330--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8330--   Scanning root segment: 0x701a000..0x701afff (4096)
--8330--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8330--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8330--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8330--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8330--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8330--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8330--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8330== Checked 1,583,944 bytes
==8330== 
==8330== LEAK SUMMARY:
==8330==    definitely lost: 253 bytes in 4 blocks
==8330==    indirectly lost: 6,756 bytes in 7 blocks
==8330==      possibly lost: 0 bytes in 0 blocks
==8330==    still reachable: 1,292,059 bytes in 27,987 blocks
==8330==         suppressed: 0 bytes in 0 blocks
==8330== Rerun with --leak-check=full to see details of leaked memory
==8330== 
==8330== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8330== 
==8330== 1 errors in context 1 of 1:
==8330== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8330==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8330==    by 0x488CD0: stringsubst (subst.c:301)
==8330==    by 0x48801B: prefork (subst.c:77)
==8330==    by 0x42B318: execcmd (exec.c:2619)
==8330==    by 0x428CA0: execpline2 (exec.c:1697)
==8330==    by 0x427FD2: execpline (exec.c:1484)
==8330==    by 0x427756: execlist (exec.c:1267)
==8330==    by 0x42717C: execode (exec.c:1073)
==8330==    by 0x431299: runshfunc (exec.c:5040)
==8330==    by 0x430E76: doshfunc (exec.c:4920)
==8330==    by 0x4302FB: execshfunc (exec.c:4557)
==8330==    by 0x42D8C1: execcmd (exec.c:3373)
==8330== 
==8330== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8331== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8331-by-pythonnut-on-???
==8331== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8331-by-pythonnut-on-???
==8331== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8331-by-pythonnut-on-???
==8331== 
==8331== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8331== don't want to do, unless you know exactly what you're doing,
==8331== or are doing some strange experiment):
==8331==   /usr/lib/valgrind/../../bin/vgdb --pid=8331 ...command...
==8331== 
==8331== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8331==   /path/to/gdb ./zsh
==8331== and then give GDB the following command
==8331==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8331
==8331== --pid is optional if only one valgrind process is running
==8331== 
--8331-- Caught __NR_exit; running __libc_freeres()
--8331-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8331== 
==8331== HEAP SUMMARY:
==8331==     in use at exit: 1,299,086 bytes in 27,998 blocks
==8331==   total heap usage: 780,586 allocs, 752,588 frees, 50,609,146 bytes allocated
==8331== 
==8331== Searching for pointers to 27,998 not-freed blocks
--8331--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8331--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8331--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8331--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8331--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8331--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8331--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8331--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8331--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8331--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8331--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8331--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8331--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8331--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8331--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8331--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8331--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8331--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8331--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8331--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8331--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8331--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8331--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8331--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8331--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8331--   Scanning root segment: 0x701a000..0x701afff (4096)
--8331--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8331--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8331--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8331--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8331--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8331--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8331--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8331== Checked 1,583,968 bytes
==8331== 
==8331== LEAK SUMMARY:
==8331==    definitely lost: 253 bytes in 4 blocks
==8331==    indirectly lost: 6,756 bytes in 7 blocks
==8331==      possibly lost: 0 bytes in 0 blocks
==8331==    still reachable: 1,292,077 bytes in 27,987 blocks
==8331==         suppressed: 0 bytes in 0 blocks
==8331== Rerun with --leak-check=full to see details of leaked memory
==8331== 
==8331== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8331== 
==8331== 1 errors in context 1 of 1:
==8331== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8331==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8331==    by 0x488CD0: stringsubst (subst.c:301)
==8331==    by 0x48801B: prefork (subst.c:77)
==8331==    by 0x42B318: execcmd (exec.c:2619)
==8331==    by 0x428CA0: execpline2 (exec.c:1697)
==8331==    by 0x427FD2: execpline (exec.c:1484)
==8331==    by 0x427756: execlist (exec.c:1267)
==8331==    by 0x42717C: execode (exec.c:1073)
==8331==    by 0x431299: runshfunc (exec.c:5040)
==8331==    by 0x430E76: doshfunc (exec.c:4920)
==8331==    by 0x4302FB: execshfunc (exec.c:4557)
==8331==    by 0x42D8C1: execcmd (exec.c:3373)
==8331== 
==8331== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8332== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8332-by-pythonnut-on-???
==8332== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8332-by-pythonnut-on-???
==8332== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8332-by-pythonnut-on-???
==8332== 
==8332== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8332== don't want to do, unless you know exactly what you're doing,
==8332== or are doing some strange experiment):
==8332==   /usr/lib/valgrind/../../bin/vgdb --pid=8332 ...command...
==8332== 
==8332== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8332==   /path/to/gdb ./zsh
==8332== and then give GDB the following command
==8332==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8332
==8332== --pid is optional if only one valgrind process is running
==8332== 
--8332-- Caught __NR_exit; running __libc_freeres()
--8332-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8332== 
==8332== HEAP SUMMARY:
==8332==     in use at exit: 1,299,062 bytes in 27,998 blocks
==8332==   total heap usage: 780,692 allocs, 752,694 frees, 50,959,446 bytes allocated
==8332== 
==8332== Searching for pointers to 27,998 not-freed blocks
--8332--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8332--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8332--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8332--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8332--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8332--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8332--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8332--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8332--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8332--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8332--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8332--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8332--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8332--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8332--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8332--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8332--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8332--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8332--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8332--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8332--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8332--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8332--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8332--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8332--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8332--   Scanning root segment: 0x701a000..0x701afff (4096)
--8332--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8332--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8332--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8332--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8332--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8332--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8332--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8332== Checked 1,583,976 bytes
==8332== 
==8332== LEAK SUMMARY:
==8332==    definitely lost: 253 bytes in 4 blocks
==8332==    indirectly lost: 6,756 bytes in 7 blocks
==8332==      possibly lost: 0 bytes in 0 blocks
==8332==    still reachable: 1,292,053 bytes in 27,987 blocks
==8332==         suppressed: 0 bytes in 0 blocks
==8332== Rerun with --leak-check=full to see details of leaked memory
==8332== 
==8332== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8332== 
==8332== 1 errors in context 1 of 1:
==8332== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8332==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8332==    by 0x488CD0: stringsubst (subst.c:301)
==8332==    by 0x48801B: prefork (subst.c:77)
==8332==    by 0x42B318: execcmd (exec.c:2619)
==8332==    by 0x428CA0: execpline2 (exec.c:1697)
==8332==    by 0x427FD2: execpline (exec.c:1484)
==8332==    by 0x427756: execlist (exec.c:1267)
==8332==    by 0x42717C: execode (exec.c:1073)
==8332==    by 0x431299: runshfunc (exec.c:5040)
==8332==    by 0x430E76: doshfunc (exec.c:4920)
==8332==    by 0x4302FB: execshfunc (exec.c:4557)
==8332==    by 0x42D8C1: execcmd (exec.c:3373)
==8332== 
==8332== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8333-- Caught __NR_exit; running __libc_freeres()
==8333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8333-by-pythonnut-on-???
==8333== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8333-by-pythonnut-on-???
==8333== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8333-by-pythonnut-on-???
==8333== 
==8333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8333== don't want to do, unless you know exactly what you're doing,
==8333== or are doing some strange experiment):
==8333==   /usr/lib/valgrind/../../bin/vgdb --pid=8333 ...command...
==8333== 
==8333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8333==   /path/to/gdb ./zsh
==8333== and then give GDB the following command
==8333==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8333
==8333== --pid is optional if only one valgrind process is running
==8333== 
--8333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8333== 
==8333== HEAP SUMMARY:
==8333==     in use at exit: 1,299,086 bytes in 27,998 blocks
==8333==   total heap usage: 780,798 allocs, 752,800 frees, 51,309,762 bytes allocated
==8333== 
==8333== Searching for pointers to 27,998 not-freed blocks
--8333--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8333--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8333--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8333--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8333--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8333--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8333--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8333--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8333--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8333--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8333--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8333--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8333--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8333--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8333--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8333--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8333--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8333--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8333--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8333--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8333--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8333--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8333--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8333--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8333--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8333--   Scanning root segment: 0x701a000..0x701afff (4096)
--8333--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8333--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8333--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8333--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8333--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8333--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8333--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8333== Checked 1,584,000 bytes
==8333== 
==8333== LEAK SUMMARY:
==8333==    definitely lost: 253 bytes in 4 blocks
==8333==    indirectly lost: 6,756 bytes in 7 blocks
==8333==      possibly lost: 0 bytes in 0 blocks
==8333==    still reachable: 1,292,077 bytes in 27,987 blocks
==8333==         suppressed: 0 bytes in 0 blocks
==8333== Rerun with --leak-check=full to see details of leaked memory
==8333== 
==8333== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8333== 
==8333== 1 errors in context 1 of 1:
==8333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8333==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8333==    by 0x488CD0: stringsubst (subst.c:301)
==8333==    by 0x48801B: prefork (subst.c:77)
==8333==    by 0x42B318: execcmd (exec.c:2619)
==8333==    by 0x428CA0: execpline2 (exec.c:1697)
==8333==    by 0x427FD2: execpline (exec.c:1484)
==8333==    by 0x427756: execlist (exec.c:1267)
==8333==    by 0x42717C: execode (exec.c:1073)
==8333==    by 0x431299: runshfunc (exec.c:5040)
==8333==    by 0x430E76: doshfunc (exec.c:4920)
==8333==    by 0x4302FB: execshfunc (exec.c:4557)
==8333==    by 0x42D8C1: execcmd (exec.c:3373)
==8333== 
==8333== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8334-by-pythonnut-on-???
==8334== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8334-by-pythonnut-on-???
==8334== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8334-by-pythonnut-on-???
==8334== 
==8334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8334== don't want to do, unless you know exactly what you're doing,
==8334== or are doing some strange experiment):
==8334==   /usr/lib/valgrind/../../bin/vgdb --pid=8334 ...command...
==8334== 
==8334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8334==   /path/to/gdb ./zsh
==8334== and then give GDB the following command
==8334==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8334
==8334== --pid is optional if only one valgrind process is running
==8334== 
--8334-- Caught __NR_exit; running __libc_freeres()
--8334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8334== 
==8334== HEAP SUMMARY:
==8334==     in use at exit: 1,299,080 bytes in 27,998 blocks
==8334==   total heap usage: 780,904 allocs, 752,906 frees, 51,660,100 bytes allocated
==8334== 
==8334== Searching for pointers to 27,998 not-freed blocks
--8334--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8334--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8334--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8334--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8334--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8334--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8334--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8334--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8334--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8334--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8334--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8334--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8334--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8334--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8334--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8334--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8334--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8334--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8334--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8334--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8334--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8334--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8334--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8334--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8334--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8334--   Scanning root segment: 0x701a000..0x701afff (4096)
--8334--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8334--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8334--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8334--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8334--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8334--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8334--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8334== Checked 1,584,000 bytes
==8334== 
==8334== LEAK SUMMARY:
==8334==    definitely lost: 253 bytes in 4 blocks
==8334==    indirectly lost: 6,756 bytes in 7 blocks
==8334==      possibly lost: 0 bytes in 0 blocks
==8334==    still reachable: 1,292,071 bytes in 27,987 blocks
==8334==         suppressed: 0 bytes in 0 blocks
==8334== Rerun with --leak-check=full to see details of leaked memory
==8334== 
==8334== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8334== 
==8334== 1 errors in context 1 of 1:
==8334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8334==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8334==    by 0x488CD0: stringsubst (subst.c:301)
==8334==    by 0x48801B: prefork (subst.c:77)
==8334==    by 0x42B318: execcmd (exec.c:2619)
==8334==    by 0x428CA0: execpline2 (exec.c:1697)
==8334==    by 0x427FD2: execpline (exec.c:1484)
==8334==    by 0x427756: execlist (exec.c:1267)
==8334==    by 0x42717C: execode (exec.c:1073)
==8334==    by 0x431299: runshfunc (exec.c:5040)
==8334==    by 0x430E76: doshfunc (exec.c:4920)
==8334==    by 0x4302FB: execshfunc (exec.c:4557)
==8334==    by 0x42D8C1: execcmd (exec.c:3373)
==8334== 
==8334== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8335-by-pythonnut-on-???
==8335== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8335-by-pythonnut-on-???
==8335== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8335-by-pythonnut-on-???
==8335== 
==8335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8335== don't want to do, unless you know exactly what you're doing,
==8335== or are doing some strange experiment):
==8335==   /usr/lib/valgrind/../../bin/vgdb --pid=8335 ...command...
==8335== 
==8335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8335==   /path/to/gdb ./zsh
==8335== and then give GDB the following command
==8335==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8335
==8335== --pid is optional if only one valgrind process is running
==8335== 
--8335-- Caught __NR_exit; running __libc_freeres()
--8335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8335== 
==8335== HEAP SUMMARY:
==8335==     in use at exit: 1,299,080 bytes in 27,998 blocks
==8335==   total heap usage: 781,010 allocs, 753,012 frees, 52,010,420 bytes allocated
==8335== 
==8335== Searching for pointers to 27,998 not-freed blocks
--8335--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8335--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8335--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8335--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8335--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8335--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8335--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8335--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8335--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8335--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8335--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8335--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8335--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8335--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8335--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8335--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8335--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8335--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8335--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8335--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8335--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8335--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8335--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8335--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8335--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8335--   Scanning root segment: 0x701a000..0x701afff (4096)
--8335--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8335--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8335--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8335--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8335--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8335--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8335--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8335== Checked 1,584,000 bytes
==8335== 
==8335== LEAK SUMMARY:
==8335==    definitely lost: 253 bytes in 4 blocks
==8335==    indirectly lost: 6,756 bytes in 7 blocks
==8335==      possibly lost: 0 bytes in 0 blocks
==8335==    still reachable: 1,292,071 bytes in 27,987 blocks
==8335==         suppressed: 0 bytes in 0 blocks
==8335== Rerun with --leak-check=full to see details of leaked memory
==8335== 
==8335== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8335== 
==8335== 1 errors in context 1 of 1:
==8335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8335==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8335==    by 0x488CD0: stringsubst (subst.c:301)
==8335==    by 0x48801B: prefork (subst.c:77)
==8335==    by 0x42B318: execcmd (exec.c:2619)
==8335==    by 0x428CA0: execpline2 (exec.c:1697)
==8335==    by 0x427FD2: execpline (exec.c:1484)
==8335==    by 0x427756: execlist (exec.c:1267)
==8335==    by 0x42717C: execode (exec.c:1073)
==8335==    by 0x431299: runshfunc (exec.c:5040)
==8335==    by 0x430E76: doshfunc (exec.c:4920)
==8335==    by 0x4302FB: execshfunc (exec.c:4557)
==8335==    by 0x42D8C1: execcmd (exec.c:3373)
==8335== 
==8335== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8336-- Caught __NR_exit; running __libc_freeres()
==8336== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8336-by-pythonnut-on-???
==8336== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8336-by-pythonnut-on-???
==8336== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8336-by-pythonnut-on-???
==8336== 
==8336== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8336== don't want to do, unless you know exactly what you're doing,
==8336== or are doing some strange experiment):
==8336==   /usr/lib/valgrind/../../bin/vgdb --pid=8336 ...command...
==8336== 
==8336== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8336==   /path/to/gdb ./zsh
==8336== and then give GDB the following command
==8336==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8336
==8336== --pid is optional if only one valgrind process is running
==8336== 
--8336-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8336== 
==8336== HEAP SUMMARY:
==8336==     in use at exit: 1,299,098 bytes in 27,998 blocks
==8336==   total heap usage: 781,116 allocs, 753,118 frees, 52,360,764 bytes allocated
==8336== 
==8336== Searching for pointers to 27,998 not-freed blocks
--8336--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8336--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8336--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8336--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8336--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8336--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8336--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8336--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8336--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8336--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8336--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8336--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8336--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8336--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8336--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8336--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8336--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8336--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8336--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8336--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8336--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8336--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8336--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8336--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8336--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8336--   Scanning root segment: 0x701a000..0x701afff (4096)
--8336--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8336--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8336--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8336--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8336--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8336--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8336--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8336== Checked 1,584,000 bytes
==8336== 
==8336== LEAK SUMMARY:
==8336==    definitely lost: 253 bytes in 4 blocks
==8336==    indirectly lost: 6,756 bytes in 7 blocks
==8336==      possibly lost: 0 bytes in 0 blocks
==8336==    still reachable: 1,292,089 bytes in 27,987 blocks
==8336==         suppressed: 0 bytes in 0 blocks
==8336== Rerun with --leak-check=full to see details of leaked memory
==8336== 
==8336== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8336== 
==8336== 1 errors in context 1 of 1:
==8336== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8336==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8336==    by 0x488CD0: stringsubst (subst.c:301)
==8336==    by 0x48801B: prefork (subst.c:77)
==8336==    by 0x42B318: execcmd (exec.c:2619)
==8336==    by 0x428CA0: execpline2 (exec.c:1697)
==8336==    by 0x427FD2: execpline (exec.c:1484)
==8336==    by 0x427756: execlist (exec.c:1267)
==8336==    by 0x42717C: execode (exec.c:1073)
==8336==    by 0x431299: runshfunc (exec.c:5040)
==8336==    by 0x430E76: doshfunc (exec.c:4920)
==8336==    by 0x4302FB: execshfunc (exec.c:4557)
==8336==    by 0x42D8C1: execcmd (exec.c:3373)
==8336== 
==8336== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8337== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8337-by-pythonnut-on-???
==8337== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8337-by-pythonnut-on-???
==8337== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8337-by-pythonnut-on-???
==8337== 
==8337== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8337== don't want to do, unless you know exactly what you're doing,
==8337== or are doing some strange experiment):
==8337==   /usr/lib/valgrind/../../bin/vgdb --pid=8337 ...command...
==8337== 
==8337== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8337==   /path/to/gdb ./zsh
==8337== and then give GDB the following command
==8337==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8337
==8337== --pid is optional if only one valgrind process is running
==8337== 
--8337-- Caught __NR_exit; running __libc_freeres()
--8337-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8337== 
==8337== HEAP SUMMARY:
==8337==     in use at exit: 1,299,104 bytes in 27,998 blocks
==8337==   total heap usage: 781,222 allocs, 753,224 frees, 52,711,128 bytes allocated
==8337== 
==8337== Searching for pointers to 27,998 not-freed blocks
--8337--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8337--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8337--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8337--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8337--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8337--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8337--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8337--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8337--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8337--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8337--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8337--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8337--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8337--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8337--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8337--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8337--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8337--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8337--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8337--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8337--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8337--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8337--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8337--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8337--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8337--   Scanning root segment: 0x701a000..0x701afff (4096)
--8337--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8337--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8337--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8337--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8337--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8337--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8337--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8337== Checked 1,584,024 bytes
==8337== 
==8337== LEAK SUMMARY:
==8337==    definitely lost: 253 bytes in 4 blocks
==8337==    indirectly lost: 6,756 bytes in 7 blocks
==8337==      possibly lost: 0 bytes in 0 blocks
==8337==    still reachable: 1,292,095 bytes in 27,987 blocks
==8337==         suppressed: 0 bytes in 0 blocks
==8337== Rerun with --leak-check=full to see details of leaked memory
==8337== 
==8337== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8337== 
==8337== 1 errors in context 1 of 1:
==8337== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8337==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8337==    by 0x488CD0: stringsubst (subst.c:301)
==8337==    by 0x48801B: prefork (subst.c:77)
==8337==    by 0x42B318: execcmd (exec.c:2619)
==8337==    by 0x428CA0: execpline2 (exec.c:1697)
==8337==    by 0x427FD2: execpline (exec.c:1484)
==8337==    by 0x427756: execlist (exec.c:1267)
==8337==    by 0x42717C: execode (exec.c:1073)
==8337==    by 0x431299: runshfunc (exec.c:5040)
==8337==    by 0x430E76: doshfunc (exec.c:4920)
==8337==    by 0x4302FB: execshfunc (exec.c:4557)
==8337==    by 0x42D8C1: execcmd (exec.c:3373)
==8337== 
==8337== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDC0C,  len 4
--8339-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF32CC,  len 4
==8339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8339-by-pythonnut-on-???
==8339== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8339-by-pythonnut-on-???
==8339== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8339-by-pythonnut-on-???
==8339== 
==8339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8339== don't want to do, unless you know exactly what you're doing,
==8339== or are doing some strange experiment):
==8339==   /usr/lib/valgrind/../../bin/vgdb --pid=8339 ...command...
==8339== 
==8339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8339==   /path/to/gdb ./zsh
==8339== and then give GDB the following command
==8339==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8339
==8339== --pid is optional if only one valgrind process is running
==8339== 
--8339-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8339== 
==8339== HEAP SUMMARY:
==8339==     in use at exit: 1,357,496 bytes in 28,690 blocks
==8339==   total heap usage: 786,800 allocs, 758,110 frees, 54,157,849 bytes allocated
==8339== 
==8339== Searching for pointers to 28,690 not-freed blocks
--8339--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8339--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8339--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8339--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8339--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8339--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8339--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8339--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8339--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8339--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8339--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8339--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8339--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8339--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8339--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8339--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8339--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8339--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8339--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8339--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8339--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8339--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8339--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8339--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8339--   Scanning root segment: 0x701a000..0x701afff (4096)
--8339--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8339--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8339--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8339--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8339--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8339--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8339--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8339== Checked 1,615,192 bytes
==8339== 
==8339== LEAK SUMMARY:
==8339==    definitely lost: 253 bytes in 4 blocks
==8339==    indirectly lost: 6,756 bytes in 7 blocks
==8339==      possibly lost: 0 bytes in 0 blocks
==8339==    still reachable: 1,350,487 bytes in 28,679 blocks
==8339==         suppressed: 0 bytes in 0 blocks
==8339== Rerun with --leak-check=full to see details of leaked memory
==8339== 
==8339== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8339== 
==8339== 1 errors in context 1 of 1:
==8339== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8339==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8339==    by 0x488CD0: stringsubst (subst.c:301)
==8339==    by 0x48801B: prefork (subst.c:77)
==8339==    by 0x42B318: execcmd (exec.c:2619)
==8339==    by 0x428CA0: execpline2 (exec.c:1697)
==8339==    by 0x427FD2: execpline (exec.c:1484)
==8339==    by 0x427756: execlist (exec.c:1267)
==8339==    by 0x42717C: execode (exec.c:1073)
==8339==    by 0x431299: runshfunc (exec.c:5040)
==8339==    by 0x430E76: doshfunc (exec.c:4920)
==8339==    by 0x4302FB: execshfunc (exec.c:4557)
==8339==    by 0x42D8C1: execcmd (exec.c:3373)
==8339== 
==8339== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8338-- Caught __NR_exit; running __libc_freeres()
==8338== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8338-by-pythonnut-on-???
==8338== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8338-by-pythonnut-on-???
==8338== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8338-by-pythonnut-on-???
==8338== 
==8338== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8338== don't want to do, unless you know exactly what you're doing,
==8338== or are doing some strange experiment):
==8338==   /usr/lib/valgrind/../../bin/vgdb --pid=8338 ...command...
==8338== 
==8338== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8338==   /path/to/gdb ./zsh
==8338== and then give GDB the following command
==8338==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8338
==8338== --pid is optional if only one valgrind process is running
==8338== 
--8338-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8338== 
==8338== HEAP SUMMARY:
==8338==     in use at exit: 1,357,432 bytes in 28,687 blocks
==8338==   total heap usage: 786,798 allocs, 758,111 frees, 54,157,608 bytes allocated
==8338== 
==8338== Searching for pointers to 28,687 not-freed blocks
--8338--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8338--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8338--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8338--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8338--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8338--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8338--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8338--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8338--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8338--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8338--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8338--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8338--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8338--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8338--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8338--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8338--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8338--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8338--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8338--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8338--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8338--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8338--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8338--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8338--   Scanning root segment: 0x701a000..0x701afff (4096)
--8338--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8338--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8338--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8338--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8338--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8338--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8338--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8338== Checked 1,614,504 bytes
==8338== 
==8338== LEAK SUMMARY:
==8338==    definitely lost: 253 bytes in 4 blocks
==8338==    indirectly lost: 6,756 bytes in 7 blocks
==8338==      possibly lost: 0 bytes in 0 blocks
==8338==    still reachable: 1,350,423 bytes in 28,676 blocks
==8338==         suppressed: 0 bytes in 0 blocks
==8338== Rerun with --leak-check=full to see details of leaked memory
==8338== 
==8338== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8338== 
==8338== 1 errors in context 1 of 1:
==8338== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8338==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8338==    by 0x488CD0: stringsubst (subst.c:301)
==8338==    by 0x48801B: prefork (subst.c:77)
==8338==    by 0x42B318: execcmd (exec.c:2619)
==8338==    by 0x428CA0: execpline2 (exec.c:1697)
==8338==    by 0x427FD2: execpline (exec.c:1484)
==8338==    by 0x427756: execlist (exec.c:1267)
==8338==    by 0x42717C: execode (exec.c:1073)
==8338==    by 0x431299: runshfunc (exec.c:5040)
==8338==    by 0x430E76: doshfunc (exec.c:4920)
==8338==    by 0x4302FB: execshfunc (exec.c:4557)
==8338==    by 0x42D8C1: execcmd (exec.c:3373)
==8338== 
==8338== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8341== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8341-by-pythonnut-on-???
==8341== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8341-by-pythonnut-on-???
==8341== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8341-by-pythonnut-on-???
==8341== 
==8341== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8341== don't want to do, unless you know exactly what you're doing,
==8341== or are doing some strange experiment):
==8341==   /usr/lib/valgrind/../../bin/vgdb --pid=8341 ...command...
==8341== 
==8341== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8341==   /path/to/gdb ./zsh
==8341== and then give GDB the following command
==8341==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8341
==8341== --pid is optional if only one valgrind process is running
==8341== 
--8341-- Caught __NR_exit; running __libc_freeres()
--8341-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8341== 
==8341== HEAP SUMMARY:
==8341==     in use at exit: 1,357,439 bytes in 28,687 blocks
==8341==   total heap usage: 786,813 allocs, 758,126 frees, 54,162,606 bytes allocated
==8341== 
==8341== Searching for pointers to 28,687 not-freed blocks
--8341--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8341--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8341--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8341--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8341--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8341--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8341--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8341--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8341--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8341--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8341--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8341--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8341--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8341--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8341--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8341--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8341--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8341--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8341--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8341--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8341--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8341--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8341--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8341--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8341--   Scanning root segment: 0x701a000..0x701afff (4096)
--8341--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8341--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8341--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8341--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8341--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8341--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8341--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8341== Checked 1,614,640 bytes
==8341== 
==8341== LEAK SUMMARY:
==8341==    definitely lost: 253 bytes in 4 blocks
==8341==    indirectly lost: 6,756 bytes in 7 blocks
==8341==      possibly lost: 0 bytes in 0 blocks
==8341==    still reachable: 1,350,430 bytes in 28,676 blocks
==8341==         suppressed: 0 bytes in 0 blocks
==8341== Rerun with --leak-check=full to see details of leaked memory
==8341== 
==8341== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8341== 
==8341== 1 errors in context 1 of 1:
==8341== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8341==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8341==    by 0x488CD0: stringsubst (subst.c:301)
==8341==    by 0x48801B: prefork (subst.c:77)
==8341==    by 0x42B318: execcmd (exec.c:2619)
==8341==    by 0x428CA0: execpline2 (exec.c:1697)
==8341==    by 0x427FD2: execpline (exec.c:1484)
==8341==    by 0x427756: execlist (exec.c:1267)
==8341==    by 0x42717C: execode (exec.c:1073)
==8341==    by 0x431299: runshfunc (exec.c:5040)
==8341==    by 0x430E76: doshfunc (exec.c:4920)
==8341==    by 0x4302FB: execshfunc (exec.c:4557)
==8341==    by 0x42D8C1: execcmd (exec.c:3373)
==8341== 
==8341== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8342-- Caught __NR_exit; running __libc_freeres()
==8342== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8342-by-pythonnut-on-???
==8342== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8342-by-pythonnut-on-???
==8342== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8342-by-pythonnut-on-???
==8342== 
==8342== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8342== don't want to do, unless you know exactly what you're doing,
==8342== or are doing some strange experiment):
==8342==   /usr/lib/valgrind/../../bin/vgdb --pid=8342 ...command...
==8342== 
==8342== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8342==   /path/to/gdb ./zsh
==8342== and then give GDB the following command
==8342==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8342
==8342== --pid is optional if only one valgrind process is running
==8342== 
--8342-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8342== 
==8342== HEAP SUMMARY:
==8342==     in use at exit: 1,357,535 bytes in 28,687 blocks
==8342==   total heap usage: 786,829 allocs, 758,142 frees, 54,167,393 bytes allocated
==8342== 
==8342== Searching for pointers to 28,687 not-freed blocks
--8342--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8342--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8342--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8342--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8342--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8342--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8342--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8342--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8342--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8342--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8342--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8342--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8342--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8342--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8342--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8342--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8342--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8342--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8342--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8342--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8342--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8342--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8342--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8342--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8342--   Scanning root segment: 0x701a000..0x701afff (4096)
--8342--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8342--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8342--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8342--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8342--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8342--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8342--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8342== Checked 1,612,144 bytes
==8342== 
==8342== LEAK SUMMARY:
==8342==    definitely lost: 253 bytes in 4 blocks
==8342==    indirectly lost: 6,756 bytes in 7 blocks
==8342==      possibly lost: 0 bytes in 0 blocks
==8342==    still reachable: 1,350,526 bytes in 28,676 blocks
==8342==         suppressed: 0 bytes in 0 blocks
==8342== Rerun with --leak-check=full to see details of leaked memory
==8342== 
==8342== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8342== 
==8342== 1 errors in context 1 of 1:
==8342== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8342==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8342==    by 0x488CD0: stringsubst (subst.c:301)
==8342==    by 0x48801B: prefork (subst.c:77)
==8342==    by 0x42B318: execcmd (exec.c:2619)
==8342==    by 0x428CA0: execpline2 (exec.c:1697)
==8342==    by 0x427FD2: execpline (exec.c:1484)
==8342==    by 0x427756: execlist (exec.c:1267)
==8342==    by 0x42717C: execode (exec.c:1073)
==8342==    by 0x431299: runshfunc (exec.c:5040)
==8342==    by 0x430E76: doshfunc (exec.c:4920)
==8342==    by 0x4302FB: execshfunc (exec.c:4557)
==8342==    by 0x42D8C1: execcmd (exec.c:3373)
==8342== 
==8342== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8343== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8343-by-pythonnut-on-???
==8343== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8343-by-pythonnut-on-???
==8343== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8343-by-pythonnut-on-???
==8343== 
==8343== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8343== don't want to do, unless you know exactly what you're doing,
==8343== or are doing some strange experiment):
==8343==   /usr/lib/valgrind/../../bin/vgdb --pid=8343 ...command...
==8343== 
==8343== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8343==   /path/to/gdb ./zsh
==8343== and then give GDB the following command
==8343==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8343
==8343== --pid is optional if only one valgrind process is running
==8343== 
--8343-- Caught __NR_exit; running __libc_freeres()
--8343-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8343== 
==8343== HEAP SUMMARY:
==8343==     in use at exit: 1,357,890 bytes in 28,694 blocks
==8343==   total heap usage: 786,878 allocs, 758,184 frees, 54,176,485 bytes allocated
==8343== 
==8343== Searching for pointers to 28,694 not-freed blocks
--8343--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8343--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8343--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8343--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8343--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8343--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8343--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8343--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8343--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8343--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8343--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8343--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8343--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8343--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8343--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8343--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8343--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8343--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8343--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8343--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8343--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8343--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8343--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8343--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8343--   Scanning root segment: 0x701a000..0x701afff (4096)
--8343--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8343--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8343--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8343--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8343--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8343--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8343--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8343== Checked 1,613,880 bytes
==8343== 
==8343== LEAK SUMMARY:
==8343==    definitely lost: 253 bytes in 4 blocks
==8343==    indirectly lost: 6,756 bytes in 7 blocks
==8343==      possibly lost: 0 bytes in 0 blocks
==8343==    still reachable: 1,350,881 bytes in 28,683 blocks
==8343==         suppressed: 0 bytes in 0 blocks
==8343== Rerun with --leak-check=full to see details of leaked memory
==8343== 
==8343== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8343== 
==8343== 1 errors in context 1 of 1:
==8343== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8343==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8343==    by 0x488CD0: stringsubst (subst.c:301)
==8343==    by 0x48801B: prefork (subst.c:77)
==8343==    by 0x42B318: execcmd (exec.c:2619)
==8343==    by 0x428CA0: execpline2 (exec.c:1697)
==8343==    by 0x427FD2: execpline (exec.c:1484)
==8343==    by 0x427756: execlist (exec.c:1267)
==8343==    by 0x42717C: execode (exec.c:1073)
==8343==    by 0x431299: runshfunc (exec.c:5040)
==8343==    by 0x430E76: doshfunc (exec.c:4920)
==8343==    by 0x4302FB: execshfunc (exec.c:4557)
==8343==    by 0x42D8C1: execcmd (exec.c:3373)
==8343== 
==8343== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8344-- Caught __NR_exit; running __libc_freeres()
==8344== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8344-by-pythonnut-on-???
==8344== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8344-by-pythonnut-on-???
==8344== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8344-by-pythonnut-on-???
==8344== 
==8344== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8344== don't want to do, unless you know exactly what you're doing,
==8344== or are doing some strange experiment):
==8344==   /usr/lib/valgrind/../../bin/vgdb --pid=8344 ...command...
==8344== 
==8344== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8344==   /path/to/gdb ./zsh
==8344== and then give GDB the following command
==8344==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8344
==8344== --pid is optional if only one valgrind process is running
==8344== 
--8344-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8344== 
==8344== HEAP SUMMARY:
==8344==     in use at exit: 1,357,732 bytes in 28,694 blocks
==8344==   total heap usage: 786,857 allocs, 758,163 frees, 54,174,179 bytes allocated
==8344== 
==8344== Searching for pointers to 28,694 not-freed blocks
--8344--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8344--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8344--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8344--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8344--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8344--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8344--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8344--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8344--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8344--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8344--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8344--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8344--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8344--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8344--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8344--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8344--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8344--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8344--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8344--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8344--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8344--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8344--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8344--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8344--   Scanning root segment: 0x701a000..0x701afff (4096)
--8344--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8344--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8344--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8344--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8344--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8344--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8344--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8344== Checked 1,612,256 bytes
==8344== 
==8344== LEAK SUMMARY:
==8344==    definitely lost: 253 bytes in 4 blocks
==8344==    indirectly lost: 6,756 bytes in 7 blocks
==8344==      possibly lost: 0 bytes in 0 blocks
==8344==    still reachable: 1,350,723 bytes in 28,683 blocks
==8344==         suppressed: 0 bytes in 0 blocks
==8344== Rerun with --leak-check=full to see details of leaked memory
==8344== 
==8344== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8344== 
==8344== 1 errors in context 1 of 1:
==8344== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8344==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8344==    by 0x488CD0: stringsubst (subst.c:301)
==8344==    by 0x48801B: prefork (subst.c:77)
==8344==    by 0x42B318: execcmd (exec.c:2619)
==8344==    by 0x428CA0: execpline2 (exec.c:1697)
==8344==    by 0x427FD2: execpline (exec.c:1484)
==8344==    by 0x427756: execlist (exec.c:1267)
==8344==    by 0x42717C: execode (exec.c:1073)
==8344==    by 0x431299: runshfunc (exec.c:5040)
==8344==    by 0x430E76: doshfunc (exec.c:4920)
==8344==    by 0x4302FB: execshfunc (exec.c:4557)
==8344==    by 0x42D8C1: execcmd (exec.c:3373)
==8344== 
==8344== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8345-by-pythonnut-on-???
==8345== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8345-by-pythonnut-on-???
==8345== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8345-by-pythonnut-on-???
==8345== 
==8345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8345== don't want to do, unless you know exactly what you're doing,
==8345== or are doing some strange experiment):
==8345==   /usr/lib/valgrind/../../bin/vgdb --pid=8345 ...command...
==8345== 
==8345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8345==   /path/to/gdb ./zsh
==8345== and then give GDB the following command
==8345==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8345
==8345== --pid is optional if only one valgrind process is running
==8345== 
--8345-- Caught __NR_exit; running __libc_freeres()
--8345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8345== 
==8345== HEAP SUMMARY:
==8345==     in use at exit: 1,357,756 bytes in 28,695 blocks
==8345==   total heap usage: 786,870 allocs, 758,175 frees, 54,176,862 bytes allocated
==8345== 
==8345== Searching for pointers to 28,695 not-freed blocks
--8345--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8345--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8345--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8345--   Scanning root segment: 0x4033000..0x4036fff (16384)
--8345--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8345--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8345--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8345--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8345--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8345--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8345--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8345--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8345--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8345--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8345--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8345--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8345--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8345--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8345--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8345--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8345--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8345--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8345--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8345--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8345--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8345--   Scanning root segment: 0x701a000..0x701afff (4096)
--8345--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8345--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8345--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8345--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8345--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8345--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8345--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8345== Checked 1,628,152 bytes
==8345== 
==8345== LEAK SUMMARY:
==8345==    definitely lost: 253 bytes in 4 blocks
==8345==    indirectly lost: 6,756 bytes in 7 blocks
==8345==      possibly lost: 0 bytes in 0 blocks
==8345==    still reachable: 1,350,747 bytes in 28,684 blocks
==8345==         suppressed: 0 bytes in 0 blocks
==8345== Rerun with --leak-check=full to see details of leaked memory
==8345== 
==8345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8345== 
==8345== 1 errors in context 1 of 1:
==8345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8345==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8345==    by 0x488CD0: stringsubst (subst.c:301)
==8345==    by 0x48801B: prefork (subst.c:77)
==8345==    by 0x42B318: execcmd (exec.c:2619)
==8345==    by 0x428CA0: execpline2 (exec.c:1697)
==8345==    by 0x427FD2: execpline (exec.c:1484)
==8345==    by 0x427756: execlist (exec.c:1267)
==8345==    by 0x42717C: execode (exec.c:1073)
==8345==    by 0x431299: runshfunc (exec.c:5040)
==8345==    by 0x430E76: doshfunc (exec.c:4920)
==8345==    by 0x4302FB: execshfunc (exec.c:4557)
==8345==    by 0x42D8C1: execcmd (exec.c:3373)
==8345== 
==8345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8346-- Caught __NR_exit; running __libc_freeres()
==8346== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8346-by-pythonnut-on-???
==8346== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8346-by-pythonnut-on-???
==8346== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8346-by-pythonnut-on-???
==8346== 
==8346== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8346== don't want to do, unless you know exactly what you're doing,
==8346== or are doing some strange experiment):
==8346==   /usr/lib/valgrind/../../bin/vgdb --pid=8346 ...command...
==8346== 
==8346== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8346==   /path/to/gdb ./zsh
==8346== and then give GDB the following command
==8346==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8346
==8346== --pid is optional if only one valgrind process is running
==8346== 
--8346-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8346== 
==8346== HEAP SUMMARY:
==8346==     in use at exit: 1,363,150 bytes in 28,704 blocks
==8346==   total heap usage: 787,161 allocs, 758,457 frees, 54,207,028 bytes allocated
==8346== 
==8346== Searching for pointers to 28,704 not-freed blocks
--8346--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8346--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8346--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8346--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8346--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8346--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8346--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8346--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8346--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8346--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8346--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8346--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8346--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8346--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8346--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8346--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8346--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8346--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8346--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8346--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8346--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8346--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8346--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8346--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8346--   Scanning root segment: 0x701a000..0x701afff (4096)
--8346--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8346--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8346--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8346--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8346--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8346--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8346--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8346== Checked 1,617,864 bytes
==8346== 
==8346== LEAK SUMMARY:
==8346==    definitely lost: 253 bytes in 4 blocks
==8346==    indirectly lost: 6,756 bytes in 7 blocks
==8346==      possibly lost: 0 bytes in 0 blocks
==8346==    still reachable: 1,356,141 bytes in 28,693 blocks
==8346==         suppressed: 0 bytes in 0 blocks
==8346== Rerun with --leak-check=full to see details of leaked memory
==8346== 
==8346== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8346== 
==8346== 1 errors in context 1 of 1:
==8346== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8346==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8346==    by 0x488CD0: stringsubst (subst.c:301)
==8346==    by 0x48801B: prefork (subst.c:77)
==8346==    by 0x42B318: execcmd (exec.c:2619)
==8346==    by 0x428CA0: execpline2 (exec.c:1697)
==8346==    by 0x427FD2: execpline (exec.c:1484)
==8346==    by 0x427756: execlist (exec.c:1267)
==8346==    by 0x42717C: execode (exec.c:1073)
==8346==    by 0x431299: runshfunc (exec.c:5040)
==8346==    by 0x430E76: doshfunc (exec.c:4920)
==8346==    by 0x4302FB: execshfunc (exec.c:4557)
==8346==    by 0x42D8C1: execcmd (exec.c:3373)
==8346== 
==8346== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8347== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8347-by-pythonnut-on-???
==8347== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8347-by-pythonnut-on-???
==8347== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8347-by-pythonnut-on-???
==8347== 
==8347== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8347== don't want to do, unless you know exactly what you're doing,
==8347== or are doing some strange experiment):
==8347==   /usr/lib/valgrind/../../bin/vgdb --pid=8347 ...command...
==8347== 
==8347== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8347==   /path/to/gdb ./zsh
==8347== and then give GDB the following command
==8347==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8347
==8347== --pid is optional if only one valgrind process is running
==8347== 
==8347== Ignoring duplicate redirection:
--8347--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8347--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--8347-- Caught __NR_exit; running __libc_freeres()
--8347-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8347== 
==8347== HEAP SUMMARY:
==8347==     in use at exit: 1,365,095 bytes in 28,774 blocks
==8347==   total heap usage: 788,181 allocs, 759,407 frees, 54,946,126 bytes allocated
==8347== 
==8347== Searching for pointers to 28,774 not-freed blocks
--8347--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8347--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8347--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8347--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8347--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8347--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8347--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8347--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8347--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8347--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8347--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8347--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8347--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8347--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8347--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8347--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8347--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8347--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8347--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8347--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8347--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8347--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8347--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8347--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8347--   Scanning root segment: 0x701a000..0x701afff (4096)
--8347--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8347--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8347--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8347--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8347--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8347--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8347--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8347== Checked 1,619,312 bytes
==8347== 
==8347== LEAK SUMMARY:
==8347==    definitely lost: 253 bytes in 4 blocks
==8347==    indirectly lost: 6,756 bytes in 7 blocks
==8347==      possibly lost: 0 bytes in 0 blocks
==8347==    still reachable: 1,358,086 bytes in 28,763 blocks
==8347==         suppressed: 0 bytes in 0 blocks
==8347== Rerun with --leak-check=full to see details of leaked memory
==8347== 
==8347== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8347== 
==8347== 1 errors in context 1 of 1:
==8347== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8347==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8347==    by 0x488CD0: stringsubst (subst.c:301)
==8347==    by 0x48801B: prefork (subst.c:77)
==8347==    by 0x42B318: execcmd (exec.c:2619)
==8347==    by 0x428CA0: execpline2 (exec.c:1697)
==8347==    by 0x427FD2: execpline (exec.c:1484)
==8347==    by 0x427756: execlist (exec.c:1267)
==8347==    by 0x42717C: execode (exec.c:1073)
==8347==    by 0x431299: runshfunc (exec.c:5040)
==8347==    by 0x430E76: doshfunc (exec.c:4920)
==8347==    by 0x4302FB: execshfunc (exec.c:4557)
==8347==    by 0x42D8C1: execcmd (exec.c:3373)
==8347== 
==8347== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8349-by-pythonnut-on-???
==8349== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8349-by-pythonnut-on-???
==8349== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8349-by-pythonnut-on-???
==8349== 
==8349== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8349== don't want to do, unless you know exactly what you're doing,
==8349== or are doing some strange experiment):
==8349==   /usr/lib/valgrind/../../bin/vgdb --pid=8349 ...command...
==8349== 
==8349== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8349==   /path/to/gdb ./zsh
==8349== and then give GDB the following command
==8349==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8349
==8349== --pid is optional if only one valgrind process is running
==8349== 
==8350== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8350-by-pythonnut-on-???
==8350== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8350-by-pythonnut-on-???
==8350== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8350-by-pythonnut-on-???
==8350== 
==8350== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8350== don't want to do, unless you know exactly what you're doing,
==8350== or are doing some strange experiment):
==8350==   /usr/lib/valgrind/../../bin/vgdb --pid=8350 ...command...
==8350== 
==8350== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8350==   /path/to/gdb ./zsh
==8350== and then give GDB the following command
==8350==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8350
==8350== --pid is optional if only one valgrind process is running
==8350== 
==8351== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8351-by-pythonnut-on-???
==8351== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8351-by-pythonnut-on-???
==8351== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8351-by-pythonnut-on-???
==8351== 
==8351== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8351== don't want to do, unless you know exactly what you're doing,
==8351== or are doing some strange experiment):
==8351==   /usr/lib/valgrind/../../bin/vgdb --pid=8351 ...command...
==8351== 
==8351== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8351==   /path/to/gdb ./zsh
==8351== and then give GDB the following command
==8351==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8351
==8351== --pid is optional if only one valgrind process is running
==8351== 
==8351== Ignoring duplicate redirection:
--8351--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8351--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/system.so
--7806--    svma 0x00000021c0, avma 0x000b86d1c0
--7806-- REDIR: 0x5a3d250 (libc.so.6:strncat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a4b430 (__strncat_sse2      ) R-> (2004.0) 0x04c2d380 strncat
--7806-- REDIR: 0x5a4b430 (libc.so.6:__strncat_sse2) redirected to 0x4c2d380 (strncat)
--8351-- Caught __NR_exit; running __libc_freeres()
--8351-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8351== 
==8351== HEAP SUMMARY:
==8351==     in use at exit: 1,371,080 bytes in 28,988 blocks
==8351==   total heap usage: 788,409 allocs, 759,421 frees, 54,957,467 bytes allocated
==8351== 
==8351== Searching for pointers to 28,988 not-freed blocks
--8351--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8351--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8351--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8351--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8351--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8351--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8351--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8351--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8351--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8351--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8351--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8351--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8351--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8351--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8351--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8351--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8351--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8351--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8351--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8351--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8351--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8351--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8351--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8351--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8351--   Scanning root segment: 0x701a000..0x701afff (4096)
--8351--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8351--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8351--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8351--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8351--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8351--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8351--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8351== Checked 1,628,784 bytes
==8351== 
==8351== LEAK SUMMARY:
==8351==    definitely lost: 253 bytes in 4 blocks
==8351==    indirectly lost: 6,756 bytes in 7 blocks
==8351==      possibly lost: 0 bytes in 0 blocks
==8351==    still reachable: 1,364,071 bytes in 28,977 blocks
==8351==         suppressed: 0 bytes in 0 blocks
==8351== Rerun with --leak-check=full to see details of leaked memory
==8351== 
==8351== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8351== 
==8351== 1 errors in context 1 of 1:
==8351== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8351==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8351==    by 0x488CD0: stringsubst (subst.c:301)
==8351==    by 0x48801B: prefork (subst.c:77)
==8351==    by 0x42B318: execcmd (exec.c:2619)
==8351==    by 0x428CA0: execpline2 (exec.c:1697)
==8351==    by 0x427FD2: execpline (exec.c:1484)
==8351==    by 0x427756: execlist (exec.c:1267)
==8351==    by 0x42717C: execode (exec.c:1073)
==8351==    by 0x431299: runshfunc (exec.c:5040)
==8351==    by 0x430E76: doshfunc (exec.c:4920)
==8351==    by 0x4302FB: execshfunc (exec.c:4557)
==8351==    by 0x42D8C1: execcmd (exec.c:3373)
==8351== 
==8351== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8352== Ignoring duplicate redirection:
--8352--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8352--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8352-by-pythonnut-on-???
==8352== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8352-by-pythonnut-on-???
==8352== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8352-by-pythonnut-on-???
==8352== 
==8352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8352== don't want to do, unless you know exactly what you're doing,
==8352== or are doing some strange experiment):
==8352==   /usr/lib/valgrind/../../bin/vgdb --pid=8352 ...command...
==8352== 
==8352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8352==   /path/to/gdb ./zsh
==8352== and then give GDB the following command
==8352==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8352
==8352== --pid is optional if only one valgrind process is running
==8352== 
--8352-- Caught __NR_exit; running __libc_freeres()
--8352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8352== 
==8352== HEAP SUMMARY:
==8352==     in use at exit: 1,371,163 bytes in 28,999 blocks
==8352==   total heap usage: 787,678 allocs, 758,679 frees, 54,746,970 bytes allocated
==8352== 
==8352== Searching for pointers to 28,999 not-freed blocks
--8352--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8352--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8352--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8352--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8352--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8352--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8352--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8352--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8352--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8352--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8352--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8352--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8352--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8352--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8352--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8352--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8352--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8352--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8352--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8352--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8352--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8352--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8352--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8352--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8352--   Scanning root segment: 0x701a000..0x701afff (4096)
--8352--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8352--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8352--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8352--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8352--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8352--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8352--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8352== Checked 1,629,640 bytes
==8352== 
==8352== LEAK SUMMARY:
==8352==    definitely lost: 253 bytes in 4 blocks
==8352==    indirectly lost: 6,756 bytes in 7 blocks
==8352==      possibly lost: 0 bytes in 0 blocks
==8352==    still reachable: 1,364,154 bytes in 28,988 blocks
==8352==         suppressed: 0 bytes in 0 blocks
==8352== Rerun with --leak-check=full to see details of leaked memory
==8352== 
==8352== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8352== 
==8352== 1 errors in context 1 of 1:
==8352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8352==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8352==    by 0x488CD0: stringsubst (subst.c:301)
==8352==    by 0x48801B: prefork (subst.c:77)
==8352==    by 0x42B318: execcmd (exec.c:2619)
==8352==    by 0x428CA0: execpline2 (exec.c:1697)
==8352==    by 0x427FD2: execpline (exec.c:1484)
==8352==    by 0x427756: execlist (exec.c:1267)
==8352==    by 0x42717C: execode (exec.c:1073)
==8352==    by 0x431299: runshfunc (exec.c:5040)
==8352==    by 0x430E76: doshfunc (exec.c:4920)
==8352==    by 0x4302FB: execshfunc (exec.c:4557)
==8352==    by 0x42D8C1: execcmd (exec.c:3373)
==8352== 
==8352== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8353== Ignoring duplicate redirection:
--8353--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8353--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8353== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8353-by-pythonnut-on-???
==8353== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8353-by-pythonnut-on-???
==8353== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8353-by-pythonnut-on-???
==8353== 
==8353== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8353== don't want to do, unless you know exactly what you're doing,
==8353== or are doing some strange experiment):
==8353==   /usr/lib/valgrind/../../bin/vgdb --pid=8353 ...command...
==8353== 
==8353== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8353==   /path/to/gdb ./zsh
==8353== and then give GDB the following command
==8353==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8353
==8353== --pid is optional if only one valgrind process is running
==8353== 
--8353-- Caught __NR_exit; running __libc_freeres()
--8353-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8353== 
==8353== HEAP SUMMARY:
==8353==     in use at exit: 1,371,298 bytes in 29,001 blocks
==8353==   total heap usage: 787,715 allocs, 758,714 frees, 54,820,129 bytes allocated
==8353== 
==8353== Searching for pointers to 29,001 not-freed blocks
--8353--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8353--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8353--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8353--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8353--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8353--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8353--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8353--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8353--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8353--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8353--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8353--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8353--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8353--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8353--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8353--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8353--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8353--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8353--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8353--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8353--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8353--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8353--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8353--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8353--   Scanning root segment: 0x701a000..0x701afff (4096)
--8353--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8353--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8353--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8353--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8353--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8353--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8353--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8353== Checked 1,629,752 bytes
==8353== 
==8353== LEAK SUMMARY:
==8353==    definitely lost: 253 bytes in 4 blocks
==8353==    indirectly lost: 6,756 bytes in 7 blocks
==8353==      possibly lost: 0 bytes in 0 blocks
==8353==    still reachable: 1,364,289 bytes in 28,990 blocks
==8353==         suppressed: 0 bytes in 0 blocks
==8353== Rerun with --leak-check=full to see details of leaked memory
==8353== 
==8353== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8353== 
==8353== 1 errors in context 1 of 1:
==8353== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8353==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8353==    by 0x488CD0: stringsubst (subst.c:301)
==8353==    by 0x48801B: prefork (subst.c:77)
==8353==    by 0x42B318: execcmd (exec.c:2619)
==8353==    by 0x428CA0: execpline2 (exec.c:1697)
==8353==    by 0x427FD2: execpline (exec.c:1484)
==8353==    by 0x427756: execlist (exec.c:1267)
==8353==    by 0x42717C: execode (exec.c:1073)
==8353==    by 0x431299: runshfunc (exec.c:5040)
==8353==    by 0x430E76: doshfunc (exec.c:4920)
==8353==    by 0x4302FB: execshfunc (exec.c:4557)
==8353==    by 0x42D8C1: execcmd (exec.c:3373)
==8353== 
==8353== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8354== Ignoring duplicate redirection:
--8354--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8354--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8354== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8354-by-pythonnut-on-???
==8354== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8354-by-pythonnut-on-???
==8354== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8354-by-pythonnut-on-???
==8354== 
==8354== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8354== don't want to do, unless you know exactly what you're doing,
==8354== or are doing some strange experiment):
==8354==   /usr/lib/valgrind/../../bin/vgdb --pid=8354 ...command...
==8354== 
==8354== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8354==   /path/to/gdb ./zsh
==8354== and then give GDB the following command
==8354==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8354
==8354== --pid is optional if only one valgrind process is running
==8354== 
--8354-- Caught __NR_exit; running __libc_freeres()
--8354-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8354== 
==8354== HEAP SUMMARY:
==8354==     in use at exit: 1,371,296 bytes in 29,001 blocks
==8354==   total heap usage: 787,769 allocs, 758,768 frees, 55,516,661 bytes allocated
==8354== 
==8354== Searching for pointers to 29,001 not-freed blocks
--8354--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8354--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8354--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8354--   Scanning root segment: 0x4035000..0x4038fff (16384)
--8354--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8354--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8354--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8354--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8354--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8354--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8354--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8354--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8354--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8354--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8354--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8354--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8354--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8354--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8354--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8354--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8354--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8354--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8354--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8354--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8354--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8354--   Scanning root segment: 0x701a000..0x701afff (4096)
--8354--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8354--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8354--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8354--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8354--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8354--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8354--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8354== Checked 1,646,144 bytes
==8354== 
==8354== LEAK SUMMARY:
==8354==    definitely lost: 253 bytes in 4 blocks
==8354==    indirectly lost: 6,756 bytes in 7 blocks
==8354==      possibly lost: 0 bytes in 0 blocks
==8354==    still reachable: 1,364,287 bytes in 28,990 blocks
==8354==         suppressed: 0 bytes in 0 blocks
==8354== Rerun with --leak-check=full to see details of leaked memory
==8354== 
==8354== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8354== 
==8354== 1 errors in context 1 of 1:
==8354== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8354==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8354==    by 0x488CD0: stringsubst (subst.c:301)
==8354==    by 0x48801B: prefork (subst.c:77)
==8354==    by 0x42B318: execcmd (exec.c:2619)
==8354==    by 0x428CA0: execpline2 (exec.c:1697)
==8354==    by 0x427FD2: execpline (exec.c:1484)
==8354==    by 0x427756: execlist (exec.c:1267)
==8354==    by 0x42717C: execode (exec.c:1073)
==8354==    by 0x431299: runshfunc (exec.c:5040)
==8354==    by 0x430E76: doshfunc (exec.c:4920)
==8354==    by 0x4302FB: execshfunc (exec.c:4557)
==8354==    by 0x42D8C1: execcmd (exec.c:3373)
==8354== 
==8354== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8355== Ignoring duplicate redirection:
--8355--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8355--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8355== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8355-by-pythonnut-on-???
==8355== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8355-by-pythonnut-on-???
==8355== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8355-by-pythonnut-on-???
==8355== 
==8355== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8355== don't want to do, unless you know exactly what you're doing,
==8355== or are doing some strange experiment):
==8355==   /usr/lib/valgrind/../../bin/vgdb --pid=8355 ...command...
==8355== 
==8355== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8355==   /path/to/gdb ./zsh
==8355== and then give GDB the following command
==8355==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8355
==8355== --pid is optional if only one valgrind process is running
==8355== 
--8355-- Caught __NR_exit; running __libc_freeres()
--8355-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8355== 
==8355== HEAP SUMMARY:
==8355==     in use at exit: 1,371,296 bytes in 29,001 blocks
==8355==   total heap usage: 787,776 allocs, 758,775 frees, 54,833,386 bytes allocated
==8355== 
==8355== Searching for pointers to 29,001 not-freed blocks
--8355--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8355--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8355--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8355--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8355--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8355--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8355--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8355--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8355--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8355--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8355--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8355--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8355--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8355--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8355--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8355--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8355--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8355--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8355--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8355--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8355--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8355--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8355--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8355--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8355--   Scanning root segment: 0x701a000..0x701afff (4096)
--8355--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8355--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8355--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8355--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8355--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8355--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8355--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8355== Checked 1,629,752 bytes
==8355== 
==8355== LEAK SUMMARY:
==8355==    definitely lost: 253 bytes in 4 blocks
==8355==    indirectly lost: 6,756 bytes in 7 blocks
==8355==      possibly lost: 0 bytes in 0 blocks
==8355==    still reachable: 1,364,287 bytes in 28,990 blocks
==8355==         suppressed: 0 bytes in 0 blocks
==8355== Rerun with --leak-check=full to see details of leaked memory
==8355== 
==8355== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8355== 
==8355== 1 errors in context 1 of 1:
==8355== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8355==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8355==    by 0x488CD0: stringsubst (subst.c:301)
==8355==    by 0x48801B: prefork (subst.c:77)
==8355==    by 0x42B318: execcmd (exec.c:2619)
==8355==    by 0x428CA0: execpline2 (exec.c:1697)
==8355==    by 0x427FD2: execpline (exec.c:1484)
==8355==    by 0x427756: execlist (exec.c:1267)
==8355==    by 0x42717C: execode (exec.c:1073)
==8355==    by 0x431299: runshfunc (exec.c:5040)
==8355==    by 0x430E76: doshfunc (exec.c:4920)
==8355==    by 0x4302FB: execshfunc (exec.c:4557)
==8355==    by 0x42D8C1: execcmd (exec.c:3373)
==8355== 
==8355== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8356== Ignoring duplicate redirection:
--8356--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8356--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8356== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8356-by-pythonnut-on-???
==8356== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8356-by-pythonnut-on-???
==8356== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8356-by-pythonnut-on-???
==8356== 
==8356== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8356== don't want to do, unless you know exactly what you're doing,
==8356== or are doing some strange experiment):
==8356==   /usr/lib/valgrind/../../bin/vgdb --pid=8356 ...command...
==8356== 
==8356== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8356==   /path/to/gdb ./zsh
==8356== and then give GDB the following command
==8356==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8356
==8356== --pid is optional if only one valgrind process is running
==8356== 
--8356-- Caught __NR_exit; running __libc_freeres()
--8356-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8356== 
==8356== HEAP SUMMARY:
==8356==     in use at exit: 1,371,298 bytes in 29,001 blocks
==8356==   total heap usage: 787,813 allocs, 758,812 frees, 54,841,329 bytes allocated
==8356== 
==8356== Searching for pointers to 29,001 not-freed blocks
--8356--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8356--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8356--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8356--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8356--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8356--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8356--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8356--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8356--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8356--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8356--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8356--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8356--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8356--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8356--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8356--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8356--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8356--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8356--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8356--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8356--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8356--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8356--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8356--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8356--   Scanning root segment: 0x701a000..0x701afff (4096)
--8356--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8356--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8356--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8356--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8356--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8356--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8356--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8356== Checked 1,629,752 bytes
==8356== 
==8356== LEAK SUMMARY:
==8356==    definitely lost: 253 bytes in 4 blocks
==8356==    indirectly lost: 6,756 bytes in 7 blocks
==8356==      possibly lost: 0 bytes in 0 blocks
==8356==    still reachable: 1,364,289 bytes in 28,990 blocks
==8356==         suppressed: 0 bytes in 0 blocks
==8356== Rerun with --leak-check=full to see details of leaked memory
==8356== 
==8356== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8356== 
==8356== 1 errors in context 1 of 1:
==8356== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8356==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8356==    by 0x488CD0: stringsubst (subst.c:301)
==8356==    by 0x48801B: prefork (subst.c:77)
==8356==    by 0x42B318: execcmd (exec.c:2619)
==8356==    by 0x428CA0: execpline2 (exec.c:1697)
==8356==    by 0x427FD2: execpline (exec.c:1484)
==8356==    by 0x427756: execlist (exec.c:1267)
==8356==    by 0x42717C: execode (exec.c:1073)
==8356==    by 0x431299: runshfunc (exec.c:5040)
==8356==    by 0x430E76: doshfunc (exec.c:4920)
==8356==    by 0x4302FB: execshfunc (exec.c:4557)
==8356==    by 0x42D8C1: execcmd (exec.c:3373)
==8356== 
==8356== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8357== Ignoring duplicate redirection:
--8357--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8357--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8357== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8357-by-pythonnut-on-???
==8357== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8357-by-pythonnut-on-???
==8357== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8357-by-pythonnut-on-???
==8357== 
==8357== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8357== don't want to do, unless you know exactly what you're doing,
==8357== or are doing some strange experiment):
==8357==   /usr/lib/valgrind/../../bin/vgdb --pid=8357 ...command...
==8357== 
==8357== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8357==   /path/to/gdb ./zsh
==8357== and then give GDB the following command
==8357==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8357
==8357== --pid is optional if only one valgrind process is running
==8357== 
--8357-- Caught __NR_exit; running __libc_freeres()
--8357-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8357== 
==8357== HEAP SUMMARY:
==8357==     in use at exit: 1,371,297 bytes in 29,001 blocks
==8357==   total heap usage: 787,847 allocs, 758,846 frees, 54,881,543 bytes allocated
==8357== 
==8357== Searching for pointers to 29,001 not-freed blocks
--8357--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8357--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8357--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8357--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8357--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8357--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8357--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8357--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8357--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8357--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8357--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8357--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8357--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8357--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8357--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8357--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8357--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8357--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8357--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8357--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8357--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8357--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8357--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8357--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8357--   Scanning root segment: 0x701a000..0x701afff (4096)
--8357--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8357--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8357--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8357--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8357--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8357--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8357--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8357== Checked 1,629,752 bytes
==8357== 
==8357== LEAK SUMMARY:
==8357==    definitely lost: 253 bytes in 4 blocks
==8357==    indirectly lost: 6,756 bytes in 7 blocks
==8357==      possibly lost: 0 bytes in 0 blocks
==8357==    still reachable: 1,364,288 bytes in 28,990 blocks
==8357==         suppressed: 0 bytes in 0 blocks
==8357== Rerun with --leak-check=full to see details of leaked memory
==8357== 
==8357== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8357== 
==8357== 1 errors in context 1 of 1:
==8357== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8357==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8357==    by 0x488CD0: stringsubst (subst.c:301)
==8357==    by 0x48801B: prefork (subst.c:77)
==8357==    by 0x42B318: execcmd (exec.c:2619)
==8357==    by 0x428CA0: execpline2 (exec.c:1697)
==8357==    by 0x427FD2: execpline (exec.c:1484)
==8357==    by 0x427756: execlist (exec.c:1267)
==8357==    by 0x42717C: execode (exec.c:1073)
==8357==    by 0x431299: runshfunc (exec.c:5040)
==8357==    by 0x430E76: doshfunc (exec.c:4920)
==8357==    by 0x4302FB: execshfunc (exec.c:4557)
==8357==    by 0x42D8C1: execcmd (exec.c:3373)
==8357== 
==8357== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8359== Ignoring duplicate redirection:
--8359--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8359--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8359== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8359-by-pythonnut-on-???
==8359== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8359-by-pythonnut-on-???
==8359== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8359-by-pythonnut-on-???
==8359== 
==8359== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8359== don't want to do, unless you know exactly what you're doing,
==8359== or are doing some strange experiment):
==8359==   /usr/lib/valgrind/../../bin/vgdb --pid=8359 ...command...
==8359== 
==8359== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8359==   /path/to/gdb ./zsh
==8359== and then give GDB the following command
==8359==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8359
==8359== --pid is optional if only one valgrind process is running
==8359== 
==8358== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8358-by-pythonnut-on-???
==8358== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8358-by-pythonnut-on-???
==8358== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8358-by-pythonnut-on-???
==8358== 
==8358== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8358== don't want to do, unless you know exactly what you're doing,
==8358== or are doing some strange experiment):
==8358==   /usr/lib/valgrind/../../bin/vgdb --pid=8358 ...command...
==8358== 
==8358== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8358==   /path/to/gdb ./zsh
==8358== and then give GDB the following command
==8358==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8358
==8358== --pid is optional if only one valgrind process is running
==8358== 
--8359-- Caught __NR_exit; running __libc_freeres()
==8361== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8361-by-pythonnut-on-???
==8361== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8361-by-pythonnut-on-???
==8361== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8361-by-pythonnut-on-???
==8361== 
==8361== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8361== don't want to do, unless you know exactly what you're doing,
==8361== or are doing some strange experiment):
==8361==   /usr/lib/valgrind/../../bin/vgdb --pid=8361 ...command...
==8361== 
==8361== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8361==   /path/to/gdb ./zsh
==8361== and then give GDB the following command
==8361==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8361
==8361== --pid is optional if only one valgrind process is running
==8361== 
==8363== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8363-by-pythonnut-on-???
==8363== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8363-by-pythonnut-on-???
==8363== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8363-by-pythonnut-on-???
==8363== 
==8363== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8363== don't want to do, unless you know exactly what you're doing,
==8363== or are doing some strange experiment):
==8363==   /usr/lib/valgrind/../../bin/vgdb --pid=8363 ...command...
==8363== 
==8363== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8363==   /path/to/gdb ./zsh
==8363== and then give GDB the following command
==8363==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8363
==8363== --pid is optional if only one valgrind process is running
==8363== 
==8362== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8362-by-pythonnut-on-???
==8362== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8362-by-pythonnut-on-???
==8362== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8362-by-pythonnut-on-???
==8362== 
==8362== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8362== don't want to do, unless you know exactly what you're doing,
==8362== or are doing some strange experiment):
==8362==   /usr/lib/valgrind/../../bin/vgdb --pid=8362 ...command...
==8362== 
==8362== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8362==   /path/to/gdb ./zsh
==8362== and then give GDB the following command
==8362==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8362
==8362== --pid is optional if only one valgrind process is running
==8362== 
--8362-- Caught __NR_exit; running __libc_freeres()
--8359-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==8359== 
==8359== HEAP SUMMARY:
==8359==     in use at exit: 1,371,295 bytes in 29,001 blocks
==8359==   total heap usage: 787,888 allocs, 758,887 frees, 55,151,466 bytes allocated
==8359== 
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--8362-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8365-- Caught __NR_exit; running __libc_freeres()
==8359== Searching for pointers to 29,001 not-freed blocks
--8359--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8359--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8359--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8359--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8359--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8359--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8359--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8359--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8359--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8359--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8359--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8359--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8359--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8359--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8359--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8359--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8359--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8359--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8359--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8359--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8359--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8359--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8359--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8359--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8359--   Scanning root segment: 0x701a000..0x701afff (4096)
--8359--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8359--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8359--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8359--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8359--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8359--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8359--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8362== 
==8362== HEAP SUMMARY:
==8362==     in use at exit: 2,983,812 bytes in 68,326 blocks
==8362==   total heap usage: 830,638 allocs, 762,312 frees, 56,958,445 bytes allocated
==8362== 
==8365== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8365-by-pythonnut-on-???
==8365== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8365-by-pythonnut-on-???
==8365== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8365-by-pythonnut-on-???
==8365== 
==8365== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8365== don't want to do, unless you know exactly what you're doing,
==8365== or are doing some strange experiment):
==8365==   /usr/lib/valgrind/../../bin/vgdb --pid=8365 ...command...
==8365== 
==8365== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8365==   /path/to/gdb ./zsh
==8365== and then give GDB the following command
==8365==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8365
==8365== --pid is optional if only one valgrind process is running
==8365== 
--8365-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8359== Checked 1,629,752 bytes
==8359== 
==8365== 
==8362== Searching for pointers to 68,326 not-freed blocks
--8362--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8362--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8362--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8362--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8362--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8362--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8362--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8362--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8362--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8362--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8362--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8362--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8362--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8362--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8362--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8362--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8362--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8362--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8362--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8362--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8362--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==8365== HEAP SUMMARY:
==8365==     in use at exit: 2,985,160 bytes in 68,318 blocks
==8365==   total heap usage: 830,629 allocs, 762,311 frees, 57,167,913 bytes allocated
==8365== 
--8362--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8362--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8362--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8362--   Scanning root segment: 0x701a000..0x701afff (4096)
--8362--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8362--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8362--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8362--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8362--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8362--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8362--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8362--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8359== LEAK SUMMARY:
==8359==    definitely lost: 253 bytes in 4 blocks
==8359==    indirectly lost: 6,756 bytes in 7 blocks
==8359==      possibly lost: 0 bytes in 0 blocks
==8359==    still reachable: 1,364,286 bytes in 28,990 blocks
==8359==         suppressed: 0 bytes in 0 blocks
==8359== Rerun with --leak-check=full to see details of leaked memory
==8359== 
==8359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8359== 
==8359== 1 errors in context 1 of 1:
==8359== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8359==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8359==    by 0x488CD0: stringsubst (subst.c:301)
==8359==    by 0x48801B: prefork (subst.c:77)
==8359==    by 0x42B318: execcmd (exec.c:2619)
==8359==    by 0x428CA0: execpline2 (exec.c:1697)
==8359==    by 0x427FD2: execpline (exec.c:1484)
==8359==    by 0x427756: execlist (exec.c:1267)
==8359==    by 0x42717C: execode (exec.c:1073)
==8359==    by 0x431299: runshfunc (exec.c:5040)
==8359==    by 0x430E76: doshfunc (exec.c:4920)
==8359==    by 0x4302FB: execshfunc (exec.c:4557)
==8359==    by 0x42D8C1: execcmd (exec.c:3373)
==8359== 
==8359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8350-- Caught __NR_exit; running __libc_freeres()
==8365== Searching for pointers to 68,318 not-freed blocks
--8365--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8365--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8365--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8365--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8365--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8365--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8365--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8365--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8365--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8365--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8365--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8365--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8365--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8365--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8365--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8365--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8365--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8365--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8365--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8365--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8365--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8365--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8365--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8365--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8365--   Scanning root segment: 0x701a000..0x701afff (4096)
--8365--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8365--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8365--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8365--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8365--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8365--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8365--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8365--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
--8350-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8350== 
==8350== HEAP SUMMARY:
==8350==     in use at exit: 1,369,210 bytes in 28,920 blocks
==8350==   total heap usage: 787,830 allocs, 758,910 frees, 54,491,153 bytes allocated
==8350== 
==8350== Searching for pointers to 28,920 not-freed blocks
--8350--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8350--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8350--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8350--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8350--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8350--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8350--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8350--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8350--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8350--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8350--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8350--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8350--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8350--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8350--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8350--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8350--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8350--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8350--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8350--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8350--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8350--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8350--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8350--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8350--   Scanning root segment: 0x701a000..0x701afff (4096)
--8350--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8350--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8350--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8350--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8350--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8350--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8350--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8362== Checked 4,630,640 bytes
==8362== 
==8350== Checked 1,625,072 bytes
==8350== 
==8350== LEAK SUMMARY:
==8350==    definitely lost: 253 bytes in 4 blocks
==8350==    indirectly lost: 6,756 bytes in 7 blocks
==8350==      possibly lost: 0 bytes in 0 blocks
==8350==    still reachable: 1,362,201 bytes in 28,909 blocks
==8350==         suppressed: 0 bytes in 0 blocks
==8350== Rerun with --leak-check=full to see details of leaked memory
==8350== 
==8350== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8350== 
==8350== 1 errors in context 1 of 1:
==8350== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8350==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8350==    by 0x488CD0: stringsubst (subst.c:301)
==8350==    by 0x48801B: prefork (subst.c:77)
==8350==    by 0x42B318: execcmd (exec.c:2619)
==8350==    by 0x428CA0: execpline2 (exec.c:1697)
==8350==    by 0x427FD2: execpline (exec.c:1484)
==8350==    by 0x427756: execlist (exec.c:1267)
==8350==    by 0x42717C: execode (exec.c:1073)
==8350==    by 0x431299: runshfunc (exec.c:5040)
==8350==    by 0x430E76: doshfunc (exec.c:4920)
==8350==    by 0x4302FB: execshfunc (exec.c:4557)
==8350==    by 0x42D8C1: execcmd (exec.c:3373)
==8350== 
==8350== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== Ignoring duplicate redirection:
--8349--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8349--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8362== LEAK SUMMARY:
==8362==    definitely lost: 253 bytes in 4 blocks
==8362==    indirectly lost: 6,756 bytes in 7 blocks
==8362==      possibly lost: 0 bytes in 0 blocks
==8362==    still reachable: 2,976,803 bytes in 68,315 blocks
==8362==         suppressed: 0 bytes in 0 blocks
==8362== Rerun with --leak-check=full to see details of leaked memory
==8362== 
==8362== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8362== 
==8362== 1 errors in context 1 of 1:
==8362== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8362==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8362==    by 0x488CD0: stringsubst (subst.c:301)
==8362==    by 0x48801B: prefork (subst.c:77)
==8362==    by 0x42B318: execcmd (exec.c:2619)
==8362==    by 0x428CA0: execpline2 (exec.c:1697)
==8362==    by 0x427FD2: execpline (exec.c:1484)
==8362==    by 0x427756: execlist (exec.c:1267)
==8362==    by 0x42717C: execode (exec.c:1073)
==8362==    by 0x431299: runshfunc (exec.c:5040)
==8362==    by 0x430E76: doshfunc (exec.c:4920)
==8362==    by 0x4302FB: execshfunc (exec.c:4557)
==8362==    by 0x42D8C1: execcmd (exec.c:3373)
==8362== 
==8362== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8360-- Caught __NR_exit; running __libc_freeres()
==8360== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8360-by-pythonnut-on-???
==8360== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8360-by-pythonnut-on-???
==8360== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8360-by-pythonnut-on-???
==8360== 
==8360== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8360== don't want to do, unless you know exactly what you're doing,
==8360== or are doing some strange experiment):
==8360==   /usr/lib/valgrind/../../bin/vgdb --pid=8360 ...command...
==8360== 
==8360== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8360==   /path/to/gdb ./zsh
==8360== and then give GDB the following command
==8360==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8360
==8360== --pid is optional if only one valgrind process is running
==8360== 
==8365== Checked 4,637,680 bytes
==8365== 
--8349-- Caught __NR_exit; running __libc_freeres()
--8360-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8365== LEAK SUMMARY:
==8365==    definitely lost: 253 bytes in 4 blocks
==8365==    indirectly lost: 6,756 bytes in 7 blocks
==8365==      possibly lost: 0 bytes in 0 blocks
==8365==    still reachable: 2,978,151 bytes in 68,307 blocks
==8365==         suppressed: 0 bytes in 0 blocks
==8365== Rerun with --leak-check=full to see details of leaked memory
==8365== 
==8365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8365== 
==8365== 1 errors in context 1 of 1:
==8365== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8365==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8365==    by 0x488CD0: stringsubst (subst.c:301)
==8365==    by 0x48801B: prefork (subst.c:77)
==8365==    by 0x42B318: execcmd (exec.c:2619)
==8365==    by 0x428CA0: execpline2 (exec.c:1697)
==8365==    by 0x427FD2: execpline (exec.c:1484)
==8365==    by 0x427756: execlist (exec.c:1267)
==8365==    by 0x42717C: execode (exec.c:1073)
==8365==    by 0x431299: runshfunc (exec.c:5040)
==8365==    by 0x430E76: doshfunc (exec.c:4920)
==8365==    by 0x4302FB: execshfunc (exec.c:4557)
==8365==    by 0x42D8C1: execcmd (exec.c:3373)
==8365== 
==8365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8360== 
==8360== HEAP SUMMARY:
==8360==     in use at exit: 2,983,748 bytes in 68,323 blocks
==8360==   total heap usage: 830,636 allocs, 762,313 frees, 56,958,204 bytes allocated
==8360== 
==8367== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8367-by-pythonnut-on-???
==8367== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8367-by-pythonnut-on-???
==8367== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8367-by-pythonnut-on-???
==8367== 
==8367== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8367== don't want to do, unless you know exactly what you're doing,
==8367== or are doing some strange experiment):
==8367==   /usr/lib/valgrind/../../bin/vgdb --pid=8367 ...command...
==8367== 
==8367== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8367==   /path/to/gdb ./zsh
==8367== and then give GDB the following command
==8367==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8367
==8367== --pid is optional if only one valgrind process is running
==8367== 
--8367-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
--8349-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF8FCC,  len 4
==8349== 
==8349== HEAP SUMMARY:
==8349==     in use at exit: 1,367,122 bytes in 28,847 blocks
==8349==   total heap usage: 787,575 allocs, 758,728 frees, 54,449,232 bytes allocated
==8349== 
==8360== Searching for pointers to 68,323 not-freed blocks
--8360--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8349== Searching for pointers to 28,847 not-freed blocks
--8349--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8349--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8360--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8360--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8349--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8360--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8349--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8360--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8360--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8349--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8360--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8349--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8360--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8360--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8349--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8360--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8349--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8349--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8360--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8349--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8360--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8349--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8360--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8349--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8360--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8349--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8360--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8349--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8360--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8349--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8349--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8360--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8349--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8360--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8360--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8349--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8349--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8360--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8349--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8360--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8349--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8360--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8349--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8360--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8349--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8360--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8349--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8349--   Scanning root segment: 0x701a000..0x701afff (4096)
--8360--   Scanning root segment: 0x701a000..0x701afff (4096)
--8349--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8360--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8349--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8360--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8349--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8360--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8349--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8360--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8349--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8360--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8349--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8360--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8349--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8360--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8360--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
client request: code 4d430005,  addr 0xFFEFF5FBC,  len 4
==8349== Checked 1,621,968 bytes
==8349== 
==8349== LEAK SUMMARY:
==8349==    definitely lost: 253 bytes in 4 blocks
==8349==    indirectly lost: 6,756 bytes in 7 blocks
==8349==      possibly lost: 0 bytes in 0 blocks
==8349==    still reachable: 1,360,113 bytes in 28,836 blocks
==8349==         suppressed: 0 bytes in 0 blocks
==8349== Rerun with --leak-check=full to see details of leaked memory
==8349== 
==8349== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== 
==8349== 1 errors in context 1 of 1:
==8349== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8349==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8349==    by 0x488CD0: stringsubst (subst.c:301)
==8349==    by 0x48801B: prefork (subst.c:77)
==8349==    by 0x42B318: execcmd (exec.c:2619)
==8349==    by 0x428CA0: execpline2 (exec.c:1697)
==8349==    by 0x427FD2: execpline (exec.c:1484)
==8349==    by 0x427756: execlist (exec.c:1267)
==8349==    by 0x42717C: execode (exec.c:1073)
==8349==    by 0x431299: runshfunc (exec.c:5040)
==8349==    by 0x430E76: doshfunc (exec.c:4920)
==8349==    by 0x4302FB: execshfunc (exec.c:4557)
==8349==    by 0x42D8C1: execcmd (exec.c:3373)
==8349== 
==8349== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8348-by-pythonnut-on-???
==8348== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8348-by-pythonnut-on-???
==8348== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8348-by-pythonnut-on-???
==8348== 
==8348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8348== don't want to do, unless you know exactly what you're doing,
==8348== or are doing some strange experiment):
==8348==   /usr/lib/valgrind/../../bin/vgdb --pid=8348 ...command...
==8348== 
==8348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8348==   /path/to/gdb ./zsh
==8348== and then give GDB the following command
==8348==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8348
==8348== --pid is optional if only one valgrind process is running
==8348== 
--8369-- Caught __NR_exit; running __libc_freeres()
==8369== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8369-by-pythonnut-on-???
==8369== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8369-by-pythonnut-on-???
==8369== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8369-by-pythonnut-on-???
==8369== 
==8369== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8369== don't want to do, unless you know exactly what you're doing,
==8369== or are doing some strange experiment):
==8369==   /usr/lib/valgrind/../../bin/vgdb --pid=8369 ...command...
==8369== 
==8369== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8369==   /path/to/gdb ./zsh
==8369== and then give GDB the following command
==8369==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8369
==8369== --pid is optional if only one valgrind process is running
==8369== 
--8369-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8369== 
==8360== Checked 4,629,952 bytes
==8360== 
==8369== HEAP SUMMARY:
==8369==     in use at exit: 1,368,844 bytes in 28,914 blocks
==8369==   total heap usage: 787,567 allocs, 758,653 frees, 54,437,661 bytes allocated
==8369== 
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
==8369== Searching for pointers to 28,914 not-freed blocks
--8369--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8369--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8369--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8369--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8369--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8369--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8369--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8369--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8369--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8369--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8369--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8369--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8369--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8369--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8369--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8369--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8369--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8369--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8369--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8369--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8369--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8369--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8369--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8369--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8369--   Scanning root segment: 0x701a000..0x701afff (4096)
--8369--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8369--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8369--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8369--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8369--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8369--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8369--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
==8360== LEAK SUMMARY:
==8360==    definitely lost: 253 bytes in 4 blocks
==8360==    indirectly lost: 6,756 bytes in 7 blocks
==8360==      possibly lost: 0 bytes in 0 blocks
==8360==    still reachable: 2,976,739 bytes in 68,312 blocks
==8360==         suppressed: 0 bytes in 0 blocks
==8360== Rerun with --leak-check=full to see details of leaked memory
==8360== 
==8360== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8360== 
==8360== 1 errors in context 1 of 1:
==8360== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8360==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8360==    by 0x488CD0: stringsubst (subst.c:301)
==8360==    by 0x48801B: prefork (subst.c:77)
==8360==    by 0x42B318: execcmd (exec.c:2619)
==8360==    by 0x428CA0: execpline2 (exec.c:1697)
==8360==    by 0x427FD2: execpline (exec.c:1484)
==8360==    by 0x427756: execlist (exec.c:1267)
==8360==    by 0x42717C: execode (exec.c:1073)
==8360==    by 0x431299: runshfunc (exec.c:5040)
==8360==    by 0x430E76: doshfunc (exec.c:4920)
==8360==    by 0x4302FB: execshfunc (exec.c:4557)
==8360==    by 0x42D8C1: execcmd (exec.c:3373)
==8360== 
==8360== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF65AC,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==8369== Checked 1,625,320 bytes
==8369== 
--8370-- Caught __NR_exit; running __libc_freeres()
==8369== LEAK SUMMARY:
==8369==    definitely lost: 253 bytes in 4 blocks
==8369==    indirectly lost: 6,756 bytes in 7 blocks
==8369==      possibly lost: 0 bytes in 0 blocks
==8369==    still reachable: 1,361,835 bytes in 28,903 blocks
client request: code 4d430005,  addr 0xFFEFEC84C,  len 4
==8369==         suppressed: 0 bytes in 0 blocks
==8369== Rerun with --leak-check=full to see details of leaked memory
==8369== 
==8369== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8369== 
==8369== 1 errors in context 1 of 1:
==8369== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8369==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8369==    by 0x488CD0: stringsubst (subst.c:301)
==8369==    by 0x48801B: prefork (subst.c:77)
==8369==    by 0x42B318: execcmd (exec.c:2619)
==8369==    by 0x428CA0: execpline2 (exec.c:1697)
==8369==    by 0x427FD2: execpline (exec.c:1484)
==8369==    by 0x427756: execlist (exec.c:1267)
==8369==    by 0x42717C: execode (exec.c:1073)
==8369==    by 0x431299: runshfunc (exec.c:5040)
==8369==    by 0x430E76: doshfunc (exec.c:4920)
==8369==    by 0x4302FB: execshfunc (exec.c:4557)
==8369==    by 0x42D8C1: execcmd (exec.c:3373)
==8369== 
==8369== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8368== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8368-by-pythonnut-on-???
==8368== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8368-by-pythonnut-on-???
==8368== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8368-by-pythonnut-on-???
==8368== 
==8368== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8368== don't want to do, unless you know exactly what you're doing,
==8368== or are doing some strange experiment):
==8368==   /usr/lib/valgrind/../../bin/vgdb --pid=8368 ...command...
==8368== 
==8368== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8368==   /path/to/gdb ./zsh
==8368== and then give GDB the following command
==8368==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8368
==8368== --pid is optional if only one valgrind process is running
==8368== 
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==8370== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8370-by-pythonnut-on-???
==8370== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8370-by-pythonnut-on-???
==8370== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8370-by-pythonnut-on-???
==8370== 
==8370== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8370== don't want to do, unless you know exactly what you're doing,
==8370== or are doing some strange experiment):
==8370==   /usr/lib/valgrind/../../bin/vgdb --pid=8370 ...command...
==8370== 
==8370== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8370==   /path/to/gdb ./zsh
==8370== and then give GDB the following command
==8370==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8370
==8370== --pid is optional if only one valgrind process is running
==8370== 
==8372== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8372-by-pythonnut-on-???
==8372== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8372-by-pythonnut-on-???
==8372== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8372-by-pythonnut-on-???
==8372== 
==8372== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8372== don't want to do, unless you know exactly what you're doing,
==8372== or are doing some strange experiment):
==8372==   /usr/lib/valgrind/../../bin/vgdb --pid=8372 ...command...
==8372== 
==8372== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8372==   /path/to/gdb ./zsh
==8372== and then give GDB the following command
==8372==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8372
==8372== --pid is optional if only one valgrind process is running
==8372== 
--8370-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8373== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8373-by-pythonnut-on-???
==8373== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8373-by-pythonnut-on-???
==8373== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8373-by-pythonnut-on-???
==8373== 
==8373== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8373== don't want to do, unless you know exactly what you're doing,
==8373== or are doing some strange experiment):
==8373==   /usr/lib/valgrind/../../bin/vgdb --pid=8373 ...command...
==8373== 
==8373== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8373==   /path/to/gdb ./zsh
==8373== and then give GDB the following command
==8373==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8373
==8373== --pid is optional if only one valgrind process is running
==8373== 
==8370== 
==8370== HEAP SUMMARY:
==8370==     in use at exit: 2,983,755 bytes in 68,323 blocks
==8370==   total heap usage: 830,651 allocs, 762,328 frees, 56,963,202 bytes allocated
==8370== 
==8374== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8374-by-pythonnut-on-???
==8374== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8374-by-pythonnut-on-???
==8374== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8374-by-pythonnut-on-???
==8374== 
==8374== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8374== don't want to do, unless you know exactly what you're doing,
==8374== or are doing some strange experiment):
==8374==   /usr/lib/valgrind/../../bin/vgdb --pid=8374 ...command...
==8374== 
==8374== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8374==   /path/to/gdb ./zsh
==8374== and then give GDB the following command
==8374==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8374
==8374== --pid is optional if only one valgrind process is running
==8374== 
==8376== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8376-by-pythonnut-on-???
==8376== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8376-by-pythonnut-on-???
==8376== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8376-by-pythonnut-on-???
==8376== 
==8376== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8376== don't want to do, unless you know exactly what you're doing,
==8376== or are doing some strange experiment):
==8376==   /usr/lib/valgrind/../../bin/vgdb --pid=8376 ...command...
==8376== 
==8376== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8376==   /path/to/gdb ./zsh
==8376== and then give GDB the following command
==8376==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8376
==8376== --pid is optional if only one valgrind process is running
==8376== 
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
==8375== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8375-by-pythonnut-on-???
==8375== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8375-by-pythonnut-on-???
==8375== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8375-by-pythonnut-on-???
==8375== 
==8375== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8375== don't want to do, unless you know exactly what you're doing,
==8375== or are doing some strange experiment):
==8375==   /usr/lib/valgrind/../../bin/vgdb --pid=8375 ...command...
==8375== 
==8375== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8375==   /path/to/gdb ./zsh
==8375== and then give GDB the following command
==8375==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8375
==8375== --pid is optional if only one valgrind process is running
==8375== 
client request: code 4d430005,  addr 0xFFEFED4DC,  len 4
==8370== Searching for pointers to 68,323 not-freed blocks
--8370--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8370--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8370--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8370--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8370--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8370--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8370--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8370--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8370--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8370--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8370--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8370--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8370--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8370--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8370--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8370--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8370--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8370--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8375-- Caught __NR_exit; running __libc_freeres()
--8370--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8370--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8370--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8370--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8370--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8370--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8370--   Scanning root segment: 0x701a000..0x701afff (4096)
--8370--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8370--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8370--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8370--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8370--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8370--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8370--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8370--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8376-- Caught __NR_exit; running __libc_freeres()
--8375-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8375== 
==8375== HEAP SUMMARY:
==8375==     in use at exit: 3,016,891 bytes in 68,815 blocks
==8375==   total heap usage: 834,379 allocs, 765,564 frees, 58,903,628 bytes allocated
==8375== 
--8376-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8376== 
==8376== HEAP SUMMARY:
==8376==     in use at exit: 1,372,120 bytes in 28,983 blocks
==8376==   total heap usage: 787,704 allocs, 758,721 frees, 54,663,017 bytes allocated
==8376== 
==8376== Searching for pointers to 28,983 not-freed blocks
--8376--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8376--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8376--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8376--   Scanning root segment: 0x4035000..0x4038fff (16384)
--8376--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8376--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8376--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8376--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8376--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8376--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8376--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8376--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8376--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8376--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8376--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8376--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8376--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8376--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8376--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8376--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8376--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8376--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8376--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8376--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8376--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8376--   Scanning root segment: 0x701a000..0x701afff (4096)
--8376--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8376--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8376--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8376--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8376--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8376--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8376--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8375== Searching for pointers to 68,815 not-freed blocks
--8375--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8375--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8375--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8375--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8375--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8375--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8375--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8375--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8375--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8375--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8375--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8375--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8375--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8375--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8375--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8375--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8375--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8375--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8375--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8375--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8375--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8375--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8375--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8375--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8375--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8375--   Scanning root segment: 0x701a000..0x701afff (4096)
--8375--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8375--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8375--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8375--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8375--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8375--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8375--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8375--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8376== Checked 1,649,112 bytes
==8376== 
==8376== LEAK SUMMARY:
==8376==    definitely lost: 253 bytes in 4 blocks
==8376==    indirectly lost: 6,756 bytes in 7 blocks
==8376==      possibly lost: 0 bytes in 0 blocks
==8376==    still reachable: 1,365,111 bytes in 28,972 blocks
==8376==         suppressed: 0 bytes in 0 blocks
==8376== Rerun with --leak-check=full to see details of leaked memory
==8376== 
==8376== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8376== 
==8376== 1 errors in context 1 of 1:
==8376== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8376==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8376==    by 0x488CD0: stringsubst (subst.c:301)
==8376==    by 0x48801B: prefork (subst.c:77)
==8376==    by 0x42B318: execcmd (exec.c:2619)
==8376==    by 0x428CA0: execpline2 (exec.c:1697)
==8376==    by 0x427FD2: execpline (exec.c:1484)
==8376==    by 0x427756: execlist (exec.c:1267)
==8376==    by 0x42717C: execode (exec.c:1073)
==8376==    by 0x431299: runshfunc (exec.c:5040)
==8376==    by 0x430E76: doshfunc (exec.c:4920)
==8376==    by 0x4302FB: execshfunc (exec.c:4557)
==8376==    by 0x42D8C1: execcmd (exec.c:3373)
==8376== 
==8376== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8370== Checked 4,630,088 bytes
==8370== 
==8378== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8378-by-pythonnut-on-???
==8378== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8378-by-pythonnut-on-???
==8378== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8378-by-pythonnut-on-???
==8378== 
==8378== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8378== don't want to do, unless you know exactly what you're doing,
==8378== or are doing some strange experiment):
==8378==   /usr/lib/valgrind/../../bin/vgdb --pid=8378 ...command...
==8378== 
==8378== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8378==   /path/to/gdb ./zsh
==8378== and then give GDB the following command
==8378==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8378
==8378== --pid is optional if only one valgrind process is running
==8378== 
==8370== LEAK SUMMARY:
==8370==    definitely lost: 253 bytes in 4 blocks
==8370==    indirectly lost: 6,756 bytes in 7 blocks
==8370==      possibly lost: 0 bytes in 0 blocks
==8370==    still reachable: 2,976,746 bytes in 68,312 blocks
==8370==         suppressed: 0 bytes in 0 blocks
==8370== Rerun with --leak-check=full to see details of leaked memory
==8370== 
==8370== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8370== 
==8370== 1 errors in context 1 of 1:
==8370== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8370==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8370==    by 0x488CD0: stringsubst (subst.c:301)
==8370==    by 0x48801B: prefork (subst.c:77)
==8370==    by 0x42B318: execcmd (exec.c:2619)
==8370==    by 0x428CA0: execpline2 (exec.c:1697)
==8370==    by 0x427FD2: execpline (exec.c:1484)
==8370==    by 0x427756: execlist (exec.c:1267)
==8370==    by 0x42717C: execode (exec.c:1073)
==8370==    by 0x431299: runshfunc (exec.c:5040)
==8370==    by 0x430E76: doshfunc (exec.c:4920)
==8370==    by 0x4302FB: execshfunc (exec.c:4557)
==8370==    by 0x42D8C1: execcmd (exec.c:3373)
==8370== 
==8370== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8379== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8379-by-pythonnut-on-???
==8379== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8379-by-pythonnut-on-???
==8379== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8379-by-pythonnut-on-???
==8379== 
==8379== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8379== don't want to do, unless you know exactly what you're doing,
==8379== or are doing some strange experiment):
==8379==   /usr/lib/valgrind/../../bin/vgdb --pid=8379 ...command...
==8379== 
==8379== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8379==   /path/to/gdb ./zsh
==8379== and then give GDB the following command
==8379==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8379
==8379== --pid is optional if only one valgrind process is running
==8379== 
--8379-- Caught __NR_exit; running __libc_freeres()
--8380-- Caught __NR_exit; running __libc_freeres()
==8380== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8380-by-pythonnut-on-???
==8380== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8380-by-pythonnut-on-???
==8380== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8380-by-pythonnut-on-???
==8380== 
==8380== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8380== don't want to do, unless you know exactly what you're doing,
==8380== or are doing some strange experiment):
==8380==   /usr/lib/valgrind/../../bin/vgdb --pid=8380 ...command...
==8380== 
==8380== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8380==   /path/to/gdb ./zsh
==8380== and then give GDB the following command
==8380==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8380
==8380== --pid is optional if only one valgrind process is running
==8380== 
==8375== Checked 4,725,768 bytes
==8375== 
--8379-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8379== 
==8379== HEAP SUMMARY:
==8379==     in use at exit: 1,445,564 bytes in 28,990 blocks
==8379==   total heap usage: 787,712 allocs, 758,722 frees, 54,739,549 bytes allocated
==8379== 
--8380-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8380== 
==8375== LEAK SUMMARY:
==8375==    definitely lost: 253 bytes in 4 blocks
==8375==    indirectly lost: 6,756 bytes in 7 blocks
==8375==      possibly lost: 0 bytes in 0 blocks
==8375==    still reachable: 3,009,882 bytes in 68,804 blocks
==8375==         suppressed: 0 bytes in 0 blocks
==8375== Rerun with --leak-check=full to see details of leaked memory
==8375== 
==8375== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8375== 
==8375== 1 errors in context 1 of 1:
==8375== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8375==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8375==    by 0x488CD0: stringsubst (subst.c:301)
==8375==    by 0x48801B: prefork (subst.c:77)
==8375==    by 0x42B318: execcmd (exec.c:2619)
==8375==    by 0x428CA0: execpline2 (exec.c:1697)
==8375==    by 0x427FD2: execpline (exec.c:1484)
==8375==    by 0x427756: execlist (exec.c:1267)
==8375==    by 0x42717C: execode (exec.c:1073)
==8375==    by 0x431299: runshfunc (exec.c:5040)
==8375==    by 0x430E76: doshfunc (exec.c:4920)
==8375==    by 0x4302FB: execshfunc (exec.c:4557)
==8375==    by 0x42D8C1: execcmd (exec.c:3373)
==8375== 
==8375== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8380== HEAP SUMMARY:
==8380==     in use at exit: 2,983,915 bytes in 68,324 blocks
==8380==   total heap usage: 830,668 allocs, 762,344 frees, 56,968,053 bytes allocated
==8380== 
==8379== Searching for pointers to 28,990 not-freed blocks
--8379--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8379--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8379--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8379--   Scanning root segment: 0x4035000..0x4041fff (53248)
--8379--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8379--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--8379--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8379--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8379--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8379--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8379--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8379--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8379--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8379--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8379--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8379--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8379--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8379--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8379--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8379--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8379--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8379--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8379--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8379--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8379--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8379--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8379--   Scanning root segment: 0x701a000..0x701afff (4096)
--8379--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8379--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8379--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8379--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8379--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8379--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8379--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8373-- Caught __NR_exit; running __libc_freeres()
==8380== Searching for pointers to 68,324 not-freed blocks
--8380--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8380--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8380--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8380--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8380--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8380--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8380--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8380--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8380--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8380--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8380--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8380--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8380--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8380--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8380--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8380--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8380--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8380--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8380--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8380--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8380--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8380--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8380--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8380--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8380--   Scanning root segment: 0x701a000..0x701afff (4096)
--8380--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8380--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8380--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8380--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8380--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8380--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8380--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8380--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8373-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8379== Checked 1,834,064 bytes
==8379== 
==8373== 
==8373== HEAP SUMMARY:
==8373==     in use at exit: 3,014,741 bytes in 68,736 blocks
==8373==   total heap usage: 834,288 allocs, 765,552 frees, 58,704,829 bytes allocated
==8373== 
==8379== LEAK SUMMARY:
==8379==    definitely lost: 253 bytes in 4 blocks
==8379==    indirectly lost: 6,756 bytes in 7 blocks
==8379==      possibly lost: 0 bytes in 0 blocks
==8379==    still reachable: 1,438,555 bytes in 28,979 blocks
==8379==         suppressed: 0 bytes in 0 blocks
==8379== Rerun with --leak-check=full to see details of leaked memory
==8379== 
==8379== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8379== 
==8379== 1 errors in context 1 of 1:
==8379== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8379==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8379==    by 0x488CD0: stringsubst (subst.c:301)
==8379==    by 0x48801B: prefork (subst.c:77)
==8379==    by 0x42B318: execcmd (exec.c:2619)
==8379==    by 0x428CA0: execpline2 (exec.c:1697)
==8379==    by 0x427FD2: execpline (exec.c:1484)
==8379==    by 0x427756: execlist (exec.c:1267)
==8379==    by 0x42717C: execode (exec.c:1073)
==8379==    by 0x431299: runshfunc (exec.c:5040)
==8379==    by 0x430E76: doshfunc (exec.c:4920)
==8379==    by 0x4302FB: execshfunc (exec.c:4557)
==8379==    by 0x42D8C1: execcmd (exec.c:3373)
==8379== 
==8379== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8373== Searching for pointers to 68,736 not-freed blocks
--8373--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8373--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8373--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8373--   Scanning root segment: 0x4037000..0x403efff (32768)
--8373--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8373--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8373--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8373--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8373--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8373--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8373--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8373--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8373--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8373--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8373--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8373--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8373--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8373--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8373--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8373--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8373--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8373--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8373--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8373--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8373--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8373--   Scanning root segment: 0x701a000..0x701afff (4096)
--8373--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8373--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8373--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8373--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8373--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8373--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8373--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8373--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8380== Checked 4,629,432 bytes
==8380== 
==8380== LEAK SUMMARY:
==8380==    definitely lost: 253 bytes in 4 blocks
==8380==    indirectly lost: 6,756 bytes in 7 blocks
==8380==      possibly lost: 0 bytes in 0 blocks
==8380==    still reachable: 2,976,906 bytes in 68,313 blocks
==8380==         suppressed: 0 bytes in 0 blocks
==8380== Rerun with --leak-check=full to see details of leaked memory
==8380== 
==8380== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8380== 
==8380== 1 errors in context 1 of 1:
==8380== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8380==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8380==    by 0x488CD0: stringsubst (subst.c:301)
==8380==    by 0x48801B: prefork (subst.c:77)
==8380==    by 0x42B318: execcmd (exec.c:2619)
==8380==    by 0x428CA0: execpline2 (exec.c:1697)
==8380==    by 0x427FD2: execpline (exec.c:1484)
==8380==    by 0x427756: execlist (exec.c:1267)
==8380==    by 0x42717C: execode (exec.c:1073)
==8380==    by 0x431299: runshfunc (exec.c:5040)
==8380==    by 0x430E76: doshfunc (exec.c:4920)
==8380==    by 0x4302FB: execshfunc (exec.c:4557)
==8380==    by 0x42D8C1: execcmd (exec.c:3373)
==8380== 
==8380== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8381== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8381-by-pythonnut-on-???
==8381== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8381-by-pythonnut-on-???
==8381== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8381-by-pythonnut-on-???
==8381== 
==8381== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8381== don't want to do, unless you know exactly what you're doing,
==8381== or are doing some strange experiment):
==8381==   /usr/lib/valgrind/../../bin/vgdb --pid=8381 ...command...
==8381== 
==8381== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8381==   /path/to/gdb ./zsh
==8381== and then give GDB the following command
==8381==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8381
==8381== --pid is optional if only one valgrind process is running
==8381== 
==8373== Checked 4,705,520 bytes
==8373== 
==8373== LEAK SUMMARY:
==8373==    definitely lost: 253 bytes in 4 blocks
==8373==    indirectly lost: 6,756 bytes in 7 blocks
==8373==      possibly lost: 0 bytes in 0 blocks
==8373==    still reachable: 3,007,732 bytes in 68,725 blocks
==8373==         suppressed: 0 bytes in 0 blocks
==8373== Rerun with --leak-check=full to see details of leaked memory
==8373== 
==8373== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8373== 
==8373== 1 errors in context 1 of 1:
==8373== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8373==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8373==    by 0x488CD0: stringsubst (subst.c:301)
==8373==    by 0x48801B: prefork (subst.c:77)
==8373==    by 0x42B318: execcmd (exec.c:2619)
==8373==    by 0x428CA0: execpline2 (exec.c:1697)
==8373==    by 0x427FD2: execpline (exec.c:1484)
==8373==    by 0x427756: execlist (exec.c:1267)
==8373==    by 0x42717C: execode (exec.c:1073)
==8373==    by 0x431299: runshfunc (exec.c:5040)
==8373==    by 0x430E76: doshfunc (exec.c:4920)
==8373==    by 0x4302FB: execshfunc (exec.c:4557)
==8373==    by 0x42D8C1: execcmd (exec.c:3373)
==8373== 
==8373== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8381-- Caught __NR_exit; running __libc_freeres()
==8382== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8382-by-pythonnut-on-???
==8382== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8382-by-pythonnut-on-???
==8382== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8382-by-pythonnut-on-???
==8382== 
==8382== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8382== don't want to do, unless you know exactly what you're doing,
==8382== or are doing some strange experiment):
==8382==   /usr/lib/valgrind/../../bin/vgdb --pid=8382 ...command...
==8382== 
==8382== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8382==   /path/to/gdb ./zsh
==8382== and then give GDB the following command
==8382==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8382
==8382== --pid is optional if only one valgrind process is running
==8382== 
--8381-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8381== 
==8381== HEAP SUMMARY:
==8381==     in use at exit: 2,984,187 bytes in 68,329 blocks
==8381==   total heap usage: 830,716 allocs, 762,387 frees, 56,977,081 bytes allocated
==8381== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8383== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8383-by-pythonnut-on-???
==8383== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8383-by-pythonnut-on-???
==8383== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8383-by-pythonnut-on-???
==8383== 
==8383== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8383== don't want to do, unless you know exactly what you're doing,
==8383== or are doing some strange experiment):
==8383==   /usr/lib/valgrind/../../bin/vgdb --pid=8383 ...command...
==8383== 
==8383== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8383==   /path/to/gdb ./zsh
==8383== and then give GDB the following command
==8383==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8383
==8383== --pid is optional if only one valgrind process is running
==8383== 
--8383-- Caught __NR_exit; running __libc_freeres()
==8381== Searching for pointers to 68,329 not-freed blocks
--8381--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8381--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8381--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8381--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8381--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8381--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8381--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8381--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8381--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8381--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8381--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8381--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8381--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8381--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8381--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8381--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8381--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8381--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8381--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8381--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8381--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8381--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8381--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8381--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8381--   Scanning root segment: 0x701a000..0x701afff (4096)
--8381--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8381--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8381--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8381--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8381--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8381--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8381--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8381--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8383-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8383== 
==8383== HEAP SUMMARY:
==8383==     in use at exit: 3,017,094 bytes in 68,822 blocks
==8383==   total heap usage: 834,396 allocs, 765,574 frees, 58,873,765 bytes allocated
==8383== 
==8383== Searching for pointers to 68,822 not-freed blocks
--8383--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8383--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8383--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8383--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8383--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8383--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8383--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8383--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8383--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8383--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8383--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8383--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8383--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8383--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8383--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8383--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8383--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8383--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8383--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8383--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8383--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8383--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8383--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8383--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8383--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8383--   Scanning root segment: 0x701a000..0x701afff (4096)
--8383--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8383--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8383--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8383--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8383--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8383--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8383--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8383--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8381== Checked 4,631,072 bytes
==8381== 
==8381== LEAK SUMMARY:
==8381==    definitely lost: 253 bytes in 4 blocks
==8381==    indirectly lost: 6,756 bytes in 7 blocks
==8381==      possibly lost: 0 bytes in 0 blocks
==8381==    still reachable: 2,977,178 bytes in 68,318 blocks
==8381==         suppressed: 0 bytes in 0 blocks
==8381== Rerun with --leak-check=full to see details of leaked memory
==8381== 
==8381== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8381== 
==8381== 1 errors in context 1 of 1:
==8381== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8381==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8381==    by 0x488CD0: stringsubst (subst.c:301)
==8381==    by 0x48801B: prefork (subst.c:77)
==8381==    by 0x42B318: execcmd (exec.c:2619)
==8381==    by 0x428CA0: execpline2 (exec.c:1697)
==8381==    by 0x427FD2: execpline (exec.c:1484)
==8381==    by 0x427756: execlist (exec.c:1267)
==8381==    by 0x42717C: execode (exec.c:1073)
==8381==    by 0x431299: runshfunc (exec.c:5040)
==8381==    by 0x430E76: doshfunc (exec.c:4920)
==8381==    by 0x4302FB: execshfunc (exec.c:4557)
==8381==    by 0x42D8C1: execcmd (exec.c:3373)
==8381== 
==8381== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8384-by-pythonnut-on-???
==8384== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8384-by-pythonnut-on-???
==8384== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8384-by-pythonnut-on-???
==8384== 
==8384== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8384== don't want to do, unless you know exactly what you're doing,
==8384== or are doing some strange experiment):
==8384==   /usr/lib/valgrind/../../bin/vgdb --pid=8384 ...command...
==8384== 
==8384== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8384==   /path/to/gdb ./zsh
==8384== and then give GDB the following command
==8384==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8384
==8384== --pid is optional if only one valgrind process is running
==8384== 
--8384-- Caught __NR_exit; running __libc_freeres()
==8383== Checked 4,726,456 bytes
==8383== 
--8384-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8383== LEAK SUMMARY:
==8383==    definitely lost: 253 bytes in 4 blocks
==8383==    indirectly lost: 6,756 bytes in 7 blocks
==8383==      possibly lost: 0 bytes in 0 blocks
==8383==    still reachable: 3,010,085 bytes in 68,811 blocks
==8383==         suppressed: 0 bytes in 0 blocks
==8383== Rerun with --leak-check=full to see details of leaked memory
==8383== 
==8383== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8383== 
==8383== 1 errors in context 1 of 1:
==8383== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8383==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8383==    by 0x488CD0: stringsubst (subst.c:301)
==8383==    by 0x48801B: prefork (subst.c:77)
==8383==    by 0x42B318: execcmd (exec.c:2619)
==8383==    by 0x428CA0: execpline2 (exec.c:1697)
==8383==    by 0x427FD2: execpline (exec.c:1484)
==8383==    by 0x427756: execlist (exec.c:1267)
==8383==    by 0x42717C: execode (exec.c:1073)
==8383==    by 0x431299: runshfunc (exec.c:5040)
==8383==    by 0x430E76: doshfunc (exec.c:4920)
==8383==    by 0x4302FB: execshfunc (exec.c:4557)
==8383==    by 0x42D8C1: execcmd (exec.c:3373)
==8383== 
==8383== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== 
==8384== HEAP SUMMARY:
==8384==     in use at exit: 2,984,029 bytes in 68,329 blocks
==8384==   total heap usage: 830,695 allocs, 762,366 frees, 56,974,775 bytes allocated
==8384== 
--8382-- Caught __NR_exit; running __libc_freeres()
==8384== Searching for pointers to 68,329 not-freed blocks
--8384--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8384--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8384--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8384--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8384--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8384--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8384--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8384--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8384--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8384--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8384--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8384--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8384--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8384--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8384--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8384--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8384--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8384--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8384--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8384--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8384--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8384--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8384--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8382-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8384--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8384--   Scanning root segment: 0x701a000..0x701afff (4096)
--8384--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8384--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8384--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8384--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8384--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8384--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8384--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8384--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8382== 
==8382== HEAP SUMMARY:
==8382==     in use at exit: 3,014,954 bytes in 68,743 blocks
==8382==   total heap usage: 834,303 allocs, 765,560 frees, 58,707,706 bytes allocated
==8382== 
==8382== Searching for pointers to 68,743 not-freed blocks
--8382--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8382--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8382--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8382--   Scanning root segment: 0x4037000..0x403efff (32768)
--8382--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8382--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8382--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8382--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8382--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8382--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8382--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8382--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8382--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8382--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8382--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8382--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8382--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8382--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8382--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8382--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8382--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8382--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8382--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8382--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8382--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8382--   Scanning root segment: 0x701a000..0x701afff (4096)
--8382--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8382--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8382--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8382--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8382--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8382--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8382--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8382--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8378-- Caught __NR_exit; running __libc_freeres()
--8378-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8384== Checked 4,629,464 bytes
==8384== 
==8378== 
==8378== HEAP SUMMARY:
==8378==     in use at exit: 1,409,137 bytes in 28,990 blocks
==8378==   total heap usage: 791,430 allocs, 762,440 frees, 55,967,706 bytes allocated
==8378== 
==8378== Searching for pointers to 28,990 not-freed blocks
--8378--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8378--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8378--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8378--   Scanning root segment: 0x4035000..0x4041fff (53248)
--8378--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8378--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--8378--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8378--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8378--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8378--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8378--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8378--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8378--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8378--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8378--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8378--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8378--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8378--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8378--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8378--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8378--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8378--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8378--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8378--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8378--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8378--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8378--   Scanning root segment: 0x701a000..0x701afff (4096)
--8378--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8378--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8378--   Scanning root segment: 0xae51000..0xae52fff (8192)
==8384== LEAK SUMMARY:
==8384==    definitely lost: 253 bytes in 4 blocks
==8384==    indirectly lost: 6,756 bytes in 7 blocks
==8384==      possibly lost: 0 bytes in 0 blocks
==8384==    still reachable: 2,977,020 bytes in 68,318 blocks
==8384==         suppressed: 0 bytes in 0 blocks
==8384== Rerun with --leak-check=full to see details of leaked memory
==8384== 
--8378--   Scanning root segment: 0xb054000..0xb054fff (4096)
==8384== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== 
--8378--   Scanning root segment: 0xb268000..0xb268fff (4096)
==8384== 1 errors in context 1 of 1:
==8384== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8384==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8384==    by 0x488CD0: stringsubst (subst.c:301)
--8378--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==8384==    by 0x48801B: prefork (subst.c:77)
==8384==    by 0x42B318: execcmd (exec.c:2619)
==8384==    by 0x428CA0: execpline2 (exec.c:1697)
==8384==    by 0x427FD2: execpline (exec.c:1484)
--8378--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8384==    by 0x427756: execlist (exec.c:1267)
==8384==    by 0x42717C: execode (exec.c:1073)
==8384==    by 0x431299: runshfunc (exec.c:5040)
==8384==    by 0x430E76: doshfunc (exec.c:4920)
==8384==    by 0x4302FB: execshfunc (exec.c:4557)
==8384==    by 0x42D8C1: execcmd (exec.c:3373)
==8384== 
==8384== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8382== Checked 4,706,232 bytes
==8382== 
==8385== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8385-by-pythonnut-on-???
==8385== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8385-by-pythonnut-on-???
==8385== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8385-by-pythonnut-on-???
==8385== 
==8385== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8385== don't want to do, unless you know exactly what you're doing,
==8385== or are doing some strange experiment):
==8385==   /usr/lib/valgrind/../../bin/vgdb --pid=8385 ...command...
==8385== 
==8385== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8385==   /path/to/gdb ./zsh
==8385== and then give GDB the following command
==8385==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8385
==8385== --pid is optional if only one valgrind process is running
==8385== 
==8378== Checked 1,796,952 bytes
==8378== 
==8378== LEAK SUMMARY:
==8378==    definitely lost: 253 bytes in 4 blocks
==8378==    indirectly lost: 6,756 bytes in 7 blocks
==8378==      possibly lost: 0 bytes in 0 blocks
==8378==    still reachable: 1,402,128 bytes in 28,979 blocks
==8378==         suppressed: 0 bytes in 0 blocks
==8378== Rerun with --leak-check=full to see details of leaked memory
==8378== 
==8378== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8378== 
==8378== 1 errors in context 1 of 1:
==8378== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8378==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8378==    by 0x488CD0: stringsubst (subst.c:301)
==8378==    by 0x48801B: prefork (subst.c:77)
==8378==    by 0x42B318: execcmd (exec.c:2619)
==8378==    by 0x428CA0: execpline2 (exec.c:1697)
==8378==    by 0x427FD2: execpline (exec.c:1484)
==8378==    by 0x427756: execlist (exec.c:1267)
==8378==    by 0x42717C: execode (exec.c:1073)
==8378==    by 0x431299: runshfunc (exec.c:5040)
==8378==    by 0x430E76: doshfunc (exec.c:4920)
==8378==    by 0x4302FB: execshfunc (exec.c:4557)
==8378==    by 0x42D8C1: execcmd (exec.c:3373)
==8378== 
==8378== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8385-- Caught __NR_exit; running __libc_freeres()
==8382== LEAK SUMMARY:
==8382==    definitely lost: 253 bytes in 4 blocks
==8382==    indirectly lost: 6,756 bytes in 7 blocks
==8382==      possibly lost: 0 bytes in 0 blocks
==8382==    still reachable: 3,007,945 bytes in 68,732 blocks
==8382==         suppressed: 0 bytes in 0 blocks
==8382== Rerun with --leak-check=full to see details of leaked memory
==8382== 
==8382== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8382== 
==8382== 1 errors in context 1 of 1:
==8382== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8382==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8382==    by 0x488CD0: stringsubst (subst.c:301)
==8382==    by 0x48801B: prefork (subst.c:77)
==8382==    by 0x42B318: execcmd (exec.c:2619)
==8382==    by 0x428CA0: execpline2 (exec.c:1697)
==8382==    by 0x427FD2: execpline (exec.c:1484)
==8382==    by 0x427756: execlist (exec.c:1267)
==8382==    by 0x42717C: execode (exec.c:1073)
==8382==    by 0x431299: runshfunc (exec.c:5040)
==8382==    by 0x430E76: doshfunc (exec.c:4920)
==8382==    by 0x4302FB: execshfunc (exec.c:4557)
==8382==    by 0x42D8C1: execcmd (exec.c:3373)
==8382== 
==8382== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8386== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8386-by-pythonnut-on-???
==8386== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8386-by-pythonnut-on-???
==8386== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8386-by-pythonnut-on-???
==8386== 
==8386== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8386== don't want to do, unless you know exactly what you're doing,
==8386== or are doing some strange experiment):
==8386==   /usr/lib/valgrind/../../bin/vgdb --pid=8386 ...command...
==8386== 
==8386== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8386==   /path/to/gdb ./zsh
==8386== and then give GDB the following command
==8386==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8386
==8386== --pid is optional if only one valgrind process is running
==8386== 
--8385-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8387== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8387-by-pythonnut-on-???
==8387== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8387-by-pythonnut-on-???
==8387== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8387-by-pythonnut-on-???
==8387== 
==8387== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8387== don't want to do, unless you know exactly what you're doing,
==8387== or are doing some strange experiment):
==8387==   /usr/lib/valgrind/../../bin/vgdb --pid=8387 ...command...
==8387== 
==8387== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8387==   /path/to/gdb ./zsh
==8387== and then give GDB the following command
==8387==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8387
==8387== --pid is optional if only one valgrind process is running
==8387== 
==8385== 
==8385== HEAP SUMMARY:
==8385==     in use at exit: 2,984,064 bytes in 68,330 blocks
==8385==   total heap usage: 830,708 allocs, 762,378 frees, 56,977,469 bytes allocated
==8385== 
--8387-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE75C,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8388== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8388-by-pythonnut-on-???
==8388== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8388-by-pythonnut-on-???
==8388== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8388-by-pythonnut-on-???
==8388== 
==8388== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8388== don't want to do, unless you know exactly what you're doing,
==8388== or are doing some strange experiment):
==8388==   /usr/lib/valgrind/../../bin/vgdb --pid=8388 ...command...
==8388== 
==8388== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8388==   /path/to/gdb ./zsh
==8388== and then give GDB the following command
==8388==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8388
==8388== --pid is optional if only one valgrind process is running
==8388== 
--8389-- Caught __NR_exit; running __libc_freeres()
==8385== Searching for pointers to 68,330 not-freed blocks
--8385--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8385--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8385--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8385--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8385--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8385--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8385--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8385--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8385--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8385--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8385--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8385--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8385--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8385--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8385--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8385--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8385--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8385--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8385--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8385--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8385--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8385--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8385--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8385--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8385--   Scanning root segment: 0x701a000..0x701afff (4096)
--8385--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8385--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8385--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8385--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8385--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8385--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8385--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8385--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8387-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8388-- Caught __NR_exit; running __libc_freeres()
==8389== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8389-by-pythonnut-on-???
==8389== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8389-by-pythonnut-on-???
==8389== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8389-by-pythonnut-on-???
==8389== 
==8389== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8389== don't want to do, unless you know exactly what you're doing,
==8389== or are doing some strange experiment):
==8389==   /usr/lib/valgrind/../../bin/vgdb --pid=8389 ...command...
==8389== 
==8389== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8389==   /path/to/gdb ./zsh
==8389== and then give GDB the following command
==8389==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8389
==8389== --pid is optional if only one valgrind process is running
==8389== 
==8387== 
==8387== HEAP SUMMARY:
==8387==     in use at exit: 1,415,351 bytes in 28,990 blocks
==8387==   total heap usage: 787,717 allocs, 758,727 frees, 54,748,044 bytes allocated
==8387== 
--8389-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8387== Searching for pointers to 28,990 not-freed blocks
--8387--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8387--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8387--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8387--   Scanning root segment: 0x4035000..0x4041fff (53248)
--8387--   Scanning root segment: 0x4043000..0x4046fff (16384)
==8389== 
--8387--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8387--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--8387--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8387--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8387--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8387--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8387--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8387--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8387--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8387--   Scanning root segment: 0x54ac000..0x54acfff (4096)
==8389== HEAP SUMMARY:
==8389==     in use at exit: 1,393,879 bytes in 28,990 blocks
==8389==   total heap usage: 787,723 allocs, 758,733 frees, 54,750,164 bytes allocated
==8389== 
--8387--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8387--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8387--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8387--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8387--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8387--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8387--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8387--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8387--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8387--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8387--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8387--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8387--   Scanning root segment: 0x701a000..0x701afff (4096)
--8387--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8387--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8387--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8387--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8387--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8387--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8387--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8388-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8389== Searching for pointers to 28,990 not-freed blocks
--8389--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8389--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8389--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8389--   Scanning root segment: 0x4035000..0x4041fff (53248)
==8388== 
--8389--   Scanning root segment: 0x4043000..0x4046fff (16384)
--8389--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8389--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--8389--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8389--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8389--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8389--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8389--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8389--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8389--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8389--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8389--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8389--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8389--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8389--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8389--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8389--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8389--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8389--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8389--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8389--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8389--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8389--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8389--   Scanning root segment: 0x701a000..0x701afff (4096)
--8389--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8389--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8389--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8389--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8389--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8389--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8389--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8388== HEAP SUMMARY:
==8388==     in use at exit: 3,017,079 bytes in 68,822 blocks
==8388==   total heap usage: 834,406 allocs, 765,584 frees, 58,843,698 bytes allocated
==8388== 
==8387== Checked 1,937,992 bytes
==8387== 
==8388== Searching for pointers to 68,822 not-freed blocks
--8388--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8387== LEAK SUMMARY:
==8387==    definitely lost: 253 bytes in 4 blocks
==8387==    indirectly lost: 6,756 bytes in 7 blocks
==8387==      possibly lost: 0 bytes in 0 blocks
==8387==    still reachable: 1,408,342 bytes in 28,979 blocks
==8387==         suppressed: 0 bytes in 0 blocks
==8387== Rerun with --leak-check=full to see details of leaked memory
==8387== 
--8388--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==8387== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8387== 
==8387== 1 errors in context 1 of 1:
==8387== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8387==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8387==    by 0x488CD0: stringsubst (subst.c:301)
==8387==    by 0x48801B: prefork (subst.c:77)
==8387==    by 0x42B318: execcmd (exec.c:2619)
==8387==    by 0x428CA0: execpline2 (exec.c:1697)
==8387==    by 0x427FD2: execpline (exec.c:1484)
==8387==    by 0x427756: execlist (exec.c:1267)
==8387==    by 0x42717C: execode (exec.c:1073)
==8387==    by 0x431299: runshfunc (exec.c:5040)
==8387==    by 0x430E76: doshfunc (exec.c:4920)
==8387==    by 0x4302FB: execshfunc (exec.c:4557)
==8387==    by 0x42D8C1: execcmd (exec.c:3373)
==8387== 
==8387== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8388--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8388--   Scanning root segment: 0x4037000..0x4042fff (49152)
==8389== Checked 1,916,640 bytes
==8389== 
--8388--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8388--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8388--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8388--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8388--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8388--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8388--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8388--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8388--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8388--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8388--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8388--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8388--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8388--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8388--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8388--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8388--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8388--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8388--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8388--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8388--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8388--   Scanning root segment: 0x701a000..0x701afff (4096)
--8388--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8388--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8388--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8388--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8388--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8388--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8388--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8388--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8389== LEAK SUMMARY:
==8389==    definitely lost: 277 bytes in 5 blocks
==8389==    indirectly lost: 6,796 bytes in 9 blocks
==8389==      possibly lost: 0 bytes in 0 blocks
==8389==    still reachable: 1,386,806 bytes in 28,976 blocks
==8389==         suppressed: 0 bytes in 0 blocks
==8389== Rerun with --leak-check=full to see details of leaked memory
==8389== 
==8389== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8389== 
==8389== 1 errors in context 1 of 1:
==8389== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8389==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8389==    by 0x488CD0: stringsubst (subst.c:301)
==8389==    by 0x48801B: prefork (subst.c:77)
==8389==    by 0x42B318: execcmd (exec.c:2619)
==8389==    by 0x428CA0: execpline2 (exec.c:1697)
==8389==    by 0x427FD2: execpline (exec.c:1484)
==8389==    by 0x427756: execlist (exec.c:1267)
==8389==    by 0x42717C: execode (exec.c:1073)
==8389==    by 0x431299: runshfunc (exec.c:5040)
==8389==    by 0x430E76: doshfunc (exec.c:4920)
==8389==    by 0x4302FB: execshfunc (exec.c:4557)
==8389==    by 0x42D8C1: execcmd (exec.c:3373)
==8389== 
==8389== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8385== Checked 4,629,024 bytes
==8385== 
==8391== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8391-by-pythonnut-on-???
==8391== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8391-by-pythonnut-on-???
==8391== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8391-by-pythonnut-on-???
==8391== 
==8391== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8391== don't want to do, unless you know exactly what you're doing,
==8391== or are doing some strange experiment):
==8391==   /usr/lib/valgrind/../../bin/vgdb --pid=8391 ...command...
==8391== 
==8391== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8391==   /path/to/gdb ./zsh
==8391== and then give GDB the following command
==8391==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8391
==8391== --pid is optional if only one valgrind process is running
==8391== 
client request: code 4d430005,  addr 0xFFEFEF0DC,  len 4
==8385== LEAK SUMMARY:
==8385==    definitely lost: 253 bytes in 4 blocks
==8385==    indirectly lost: 6,756 bytes in 7 blocks
==8385==      possibly lost: 0 bytes in 0 blocks
==8385==    still reachable: 2,977,055 bytes in 68,319 blocks
==8385==         suppressed: 0 bytes in 0 blocks
==8385== Rerun with --leak-check=full to see details of leaked memory
==8385== 
==8385== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8385== 
==8385== 1 errors in context 1 of 1:
==8385== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8385==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8385==    by 0x488CD0: stringsubst (subst.c:301)
==8385==    by 0x48801B: prefork (subst.c:77)
==8385==    by 0x42B318: execcmd (exec.c:2619)
==8385==    by 0x428CA0: execpline2 (exec.c:1697)
==8385==    by 0x427FD2: execpline (exec.c:1484)
==8385==    by 0x427756: execlist (exec.c:1267)
==8385==    by 0x42717C: execode (exec.c:1073)
==8385==    by 0x431299: runshfunc (exec.c:5040)
==8385==    by 0x430E76: doshfunc (exec.c:4920)
==8385==    by 0x4302FB: execshfunc (exec.c:4557)
==8385==    by 0x42D8C1: execcmd (exec.c:3373)
==8385== 
==8385== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8374-- Caught __NR_exit; running __libc_freeres()
==8392== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8392-by-pythonnut-on-???
==8392== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8392-by-pythonnut-on-???
==8392== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8392-by-pythonnut-on-???
==8392== 
==8392== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8392== don't want to do, unless you know exactly what you're doing,
==8392== or are doing some strange experiment):
==8392==   /usr/lib/valgrind/../../bin/vgdb --pid=8392 ...command...
==8392== 
==8392== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8392==   /path/to/gdb ./zsh
==8392== and then give GDB the following command
==8392==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8392
==8392== --pid is optional if only one valgrind process is running
==8392== 
--8374-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8392-- Caught __NR_exit; running __libc_freeres()
==8374== 
==8374== HEAP SUMMARY:
==8374==     in use at exit: 1,371,697 bytes in 28,972 blocks
==8374==   total heap usage: 787,724 allocs, 758,752 frees, 54,750,732 bytes allocated
==8374== 
==8374== Searching for pointers to 28,972 not-freed blocks
--8374--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8374--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8374--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8374--   Scanning root segment: 0x4035000..0x4038fff (16384)
==8388== Checked 4,726,456 bytes
--8374--   Scanning root segment: 0x4049000..0x404cfff (16384)
==8388== 
--8374--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8374--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8374--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8374--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8374--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8374--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8374--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8374--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8374--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8374--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8374--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8374--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8374--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8374--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8374--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8374--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8374--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8374--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8374--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8374--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8374--   Scanning root segment: 0x701a000..0x701afff (4096)
--8374--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8374--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8374--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8374--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8374--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8374--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8374--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8392-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8392== 
==8388== LEAK SUMMARY:
==8388==    definitely lost: 253 bytes in 4 blocks
==8388==    indirectly lost: 6,756 bytes in 7 blocks
==8388==      possibly lost: 0 bytes in 0 blocks
==8388==    still reachable: 3,010,070 bytes in 68,811 blocks
==8388==         suppressed: 0 bytes in 0 blocks
==8388== Rerun with --leak-check=full to see details of leaked memory
==8388== 
==8388== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8388== 
==8388== 1 errors in context 1 of 1:
==8388== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8388==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8388==    by 0x488CD0: stringsubst (subst.c:301)
==8388==    by 0x48801B: prefork (subst.c:77)
==8388==    by 0x42B318: execcmd (exec.c:2619)
==8388==    by 0x428CA0: execpline2 (exec.c:1697)
==8388==    by 0x427FD2: execpline (exec.c:1484)
==8388==    by 0x427756: execlist (exec.c:1267)
==8388==    by 0x42717C: execode (exec.c:1073)
==8388==    by 0x431299: runshfunc (exec.c:5040)
==8388==    by 0x430E76: doshfunc (exec.c:4920)
==8388==    by 0x4302FB: execshfunc (exec.c:4557)
==8388==    by 0x42D8C1: execcmd (exec.c:3373)
==8388== 
==8388== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8392== HEAP SUMMARY:
==8392==     in use at exit: 2,982,589 bytes in 68,270 blocks
==8392==   total heap usage: 830,678 allocs, 762,408 frees, 56,980,498 bytes allocated
==8392== 
==8374== Checked 1,646,632 bytes
==8374== 
--8386-- Caught __NR_exit; running __libc_freeres()
==8374== LEAK SUMMARY:
==8374==    definitely lost: 253 bytes in 4 blocks
==8374==    indirectly lost: 6,756 bytes in 7 blocks
==8374==      possibly lost: 0 bytes in 0 blocks
==8374==    still reachable: 1,364,688 bytes in 28,961 blocks
==8374==         suppressed: 0 bytes in 0 blocks
==8374== Rerun with --leak-check=full to see details of leaked memory
==8374== 
==8374== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8374== 
==8374== 1 errors in context 1 of 1:
==8374== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8374==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8374==    by 0x488CD0: stringsubst (subst.c:301)
==8374==    by 0x48801B: prefork (subst.c:77)
==8374==    by 0x42B318: execcmd (exec.c:2619)
==8374==    by 0x428CA0: execpline2 (exec.c:1697)
==8374==    by 0x427FD2: execpline (exec.c:1484)
==8374==    by 0x427756: execlist (exec.c:1267)
==8374==    by 0x42717C: execode (exec.c:1073)
==8374==    by 0x431299: runshfunc (exec.c:5040)
==8374==    by 0x430E76: doshfunc (exec.c:4920)
==8374==    by 0x4302FB: execshfunc (exec.c:4557)
==8374==    by 0x42D8C1: execcmd (exec.c:3373)
==8374== 
==8374== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8386-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8392== Searching for pointers to 68,270 not-freed blocks
--8392--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8392--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8392--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8392--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8392--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8392--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8392--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8392--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8392--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8392--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8392--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8392--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8392--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8392--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8392--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8392--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8392--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8392--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8392--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8392--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8392--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8392--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8392--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8392--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8392--   Scanning root segment: 0x701a000..0x701afff (4096)
--8392--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8392--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8392--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8392--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8392--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8392--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8392--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8392--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8386== 
==8393== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8393-by-pythonnut-on-???
==8393== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8393-by-pythonnut-on-???
==8393== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8393-by-pythonnut-on-???
==8393== 
==8393== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8393== don't want to do, unless you know exactly what you're doing,
==8393== or are doing some strange experiment):
==8393==   /usr/lib/valgrind/../../bin/vgdb --pid=8393 ...command...
==8393== 
==8393== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8393==   /path/to/gdb ./zsh
==8393== and then give GDB the following command
==8393==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8393
==8393== --pid is optional if only one valgrind process is running
==8393== 
==8386== HEAP SUMMARY:
==8386==     in use at exit: 3,014,949 bytes in 68,743 blocks
==8386==   total heap usage: 834,313 allocs, 765,570 frees, 58,710,458 bytes allocated
==8386== 
--8393-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEFEDC,  len 4
==8386== Searching for pointers to 68,743 not-freed blocks
--8386--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8386--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8386--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8386--   Scanning root segment: 0x4037000..0x403efff (32768)
--8386--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8386--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8386--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8386--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8386--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8386--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8386--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8386--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8386--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8386--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8386--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8386--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8386--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8386--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8386--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8386--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8393-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8386--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8386--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8386--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8386--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8386--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8386--   Scanning root segment: 0x701a000..0x701afff (4096)
--8386--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8386--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8386--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8386--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8386--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8386--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8386--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8386--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8393== 
==8393== HEAP SUMMARY:
==8393==     in use at exit: 1,409,207 bytes in 28,973 blocks
==8393==   total heap usage: 787,688 allocs, 758,715 frees, 54,701,568 bytes allocated
==8393== 
==8393== Searching for pointers to 28,973 not-freed blocks
--8393--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8393--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8393--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8393--   Scanning root segment: 0x4035000..0x4038fff (16384)
--8393--   Scanning root segment: 0x403a000..0x4047fff (57344)
--8393--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8393--   Scanning root segment: 0x41d6000..0x41edfff (98304)
--8393--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8393--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8393--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8393--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8393--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8393--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8393--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8393--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8393--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8393--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8393--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8393--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8393--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8393--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8393--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8393--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8393--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8393--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8393--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8393--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8393--   Scanning root segment: 0x701a000..0x701afff (4096)
--8393--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8393--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8393--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8393--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8393--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8393--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8393--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8393== Checked 1,840,504 bytes
==8393== 
==8393== LEAK SUMMARY:
==8393==    definitely lost: 253 bytes in 4 blocks
==8393==    indirectly lost: 6,756 bytes in 7 blocks
==8393==      possibly lost: 0 bytes in 0 blocks
==8393==    still reachable: 1,402,198 bytes in 28,962 blocks
==8393==         suppressed: 0 bytes in 0 blocks
==8393== Rerun with --leak-check=full to see details of leaked memory
==8393== 
==8393== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8393== 
==8393== 1 errors in context 1 of 1:
==8393== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8393==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8393==    by 0x488CD0: stringsubst (subst.c:301)
==8393==    by 0x48801B: prefork (subst.c:77)
==8393==    by 0x42B318: execcmd (exec.c:2619)
==8393==    by 0x428CA0: execpline2 (exec.c:1697)
==8393==    by 0x427FD2: execpline (exec.c:1484)
==8393==    by 0x427756: execlist (exec.c:1267)
==8393==    by 0x42717C: execode (exec.c:1073)
==8393==    by 0x431299: runshfunc (exec.c:5040)
==8393==    by 0x430E76: doshfunc (exec.c:4920)
==8393==    by 0x4302FB: execshfunc (exec.c:4557)
==8393==    by 0x42D8C1: execcmd (exec.c:3373)
==8393== 
==8393== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8372-- Caught __NR_exit; running __libc_freeres()
==8392== Checked 4,628,456 bytes
==8392== 
==8392== LEAK SUMMARY:
==8392==    definitely lost: 253 bytes in 4 blocks
==8392==    indirectly lost: 6,756 bytes in 7 blocks
==8392==      possibly lost: 0 bytes in 0 blocks
==8392==    still reachable: 2,975,580 bytes in 68,259 blocks
==8392==         suppressed: 0 bytes in 0 blocks
==8392== Rerun with --leak-check=full to see details of leaked memory
==8392== 
==8392== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8392== 
==8392== 1 errors in context 1 of 1:
==8392== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8392==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8392==    by 0x488CD0: stringsubst (subst.c:301)
==8392==    by 0x48801B: prefork (subst.c:77)
==8392==    by 0x42B318: execcmd (exec.c:2619)
==8392==    by 0x428CA0: execpline2 (exec.c:1697)
==8392==    by 0x427FD2: execpline (exec.c:1484)
==8392==    by 0x427756: execlist (exec.c:1267)
==8392==    by 0x42717C: execode (exec.c:1073)
==8392==    by 0x431299: runshfunc (exec.c:5040)
==8392==    by 0x430E76: doshfunc (exec.c:4920)
==8392==    by 0x4302FB: execshfunc (exec.c:4557)
==8392==    by 0x42D8C1: execcmd (exec.c:3373)
==8392== 
==8392== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8372-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8386== Checked 4,706,224 bytes
==8386== 
==8372== 
==8372== HEAP SUMMARY:
==8372==     in use at exit: 1,370,462 bytes in 28,940 blocks
==8372==   total heap usage: 787,691 allocs, 758,751 frees, 54,702,144 bytes allocated
==8372== 
==8372== Searching for pointers to 28,940 not-freed blocks
--8372--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8372--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8372--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8372--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8372--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8372--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8372--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8372--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8372--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8372--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8372--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8372--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8372--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8372--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8372--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8372--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8372--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8372--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8372--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8372--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8372--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8372--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8372--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8372--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8372--   Scanning root segment: 0x701a000..0x701afff (4096)
--8372--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8372--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8372--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8372--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8372--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8372--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8372--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8386== LEAK SUMMARY:
==8386==    definitely lost: 253 bytes in 4 blocks
==8386==    indirectly lost: 6,756 bytes in 7 blocks
==8386==      possibly lost: 0 bytes in 0 blocks
==8386==    still reachable: 3,007,940 bytes in 68,732 blocks
==8386==         suppressed: 0 bytes in 0 blocks
==8386== Rerun with --leak-check=full to see details of leaked memory
==8386== 
==8386== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8386== 
==8386== 1 errors in context 1 of 1:
==8386== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8386==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8386==    by 0x488CD0: stringsubst (subst.c:301)
==8386==    by 0x48801B: prefork (subst.c:77)
==8386==    by 0x42B318: execcmd (exec.c:2619)
==8386==    by 0x428CA0: execpline2 (exec.c:1697)
==8386==    by 0x427FD2: execpline (exec.c:1484)
==8386==    by 0x427756: execlist (exec.c:1267)
==8386==    by 0x42717C: execode (exec.c:1073)
==8386==    by 0x431299: runshfunc (exec.c:5040)
==8386==    by 0x430E76: doshfunc (exec.c:4920)
==8386==    by 0x4302FB: execshfunc (exec.c:4557)
==8386==    by 0x42D8C1: execcmd (exec.c:3373)
==8386== 
==8386== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8395== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8395-by-pythonnut-on-???
==8395== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8395-by-pythonnut-on-???
==8395== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8395-by-pythonnut-on-???
==8395== 
==8395== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8395== don't want to do, unless you know exactly what you're doing,
==8395== or are doing some strange experiment):
==8395==   /usr/lib/valgrind/../../bin/vgdb --pid=8395 ...command...
==8395== 
==8395== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8395==   /path/to/gdb ./zsh
==8395== and then give GDB the following command
==8395==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8395
==8395== --pid is optional if only one valgrind process is running
==8395== 
==8372== Checked 1,627,256 bytes
==8372== 
==8372== LEAK SUMMARY:
==8372==    definitely lost: 253 bytes in 4 blocks
==8372==    indirectly lost: 6,756 bytes in 7 blocks
==8372==      possibly lost: 0 bytes in 0 blocks
==8372==    still reachable: 1,363,453 bytes in 28,929 blocks
==8372==         suppressed: 0 bytes in 0 blocks
==8372== Rerun with --leak-check=full to see details of leaked memory
==8372== 
==8372== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8372== 
==8372== 1 errors in context 1 of 1:
==8372== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8372==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8372==    by 0x488CD0: stringsubst (subst.c:301)
==8372==    by 0x48801B: prefork (subst.c:77)
==8372==    by 0x42B318: execcmd (exec.c:2619)
==8372==    by 0x428CA0: execpline2 (exec.c:1697)
==8372==    by 0x427FD2: execpline (exec.c:1484)
==8372==    by 0x427756: execlist (exec.c:1267)
==8372==    by 0x42717C: execode (exec.c:1073)
==8372==    by 0x431299: runshfunc (exec.c:5040)
==8372==    by 0x430E76: doshfunc (exec.c:4920)
==8372==    by 0x4302FB: execshfunc (exec.c:4557)
==8372==    by 0x42D8C1: execcmd (exec.c:3373)
==8372== 
==8372== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8396== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8396-by-pythonnut-on-???
==8396== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8396-by-pythonnut-on-???
==8396== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8396-by-pythonnut-on-???
==8396== 
==8396== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8396== don't want to do, unless you know exactly what you're doing,
==8396== or are doing some strange experiment):
==8396==   /usr/lib/valgrind/../../bin/vgdb --pid=8396 ...command...
==8396== 
==8396== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8396==   /path/to/gdb ./zsh
==8396== and then give GDB the following command
==8396==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8396
==8396== --pid is optional if only one valgrind process is running
==8396== 
--8396-- Caught __NR_exit; running __libc_freeres()
==8397== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8397-by-pythonnut-on-???
==8397== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8397-by-pythonnut-on-???
==8397== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8397-by-pythonnut-on-???
==8397== 
==8397== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8397== don't want to do, unless you know exactly what you're doing,
==8397== or are doing some strange experiment):
==8397==   /usr/lib/valgrind/../../bin/vgdb --pid=8397 ...command...
==8397== 
==8397== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8397==   /path/to/gdb ./zsh
==8397== and then give GDB the following command
==8397==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8397
==8397== --pid is optional if only one valgrind process is running
==8397== 
--8396-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8396== 
==8396== HEAP SUMMARY:
==8396==     in use at exit: 3,017,044 bytes in 68,822 blocks
==8396==   total heap usage: 834,418 allocs, 765,596 frees, 58,813,649 bytes allocated
==8396== 
--8397-- Caught __NR_exit; running __libc_freeres()
==8396== Searching for pointers to 68,822 not-freed blocks
--8396--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8396--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8396--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8396--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8396--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8396--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8396--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8396--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8396--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8396--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8396--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8396--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8396--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8396--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8396--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8396--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8396--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8396--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8396--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8396--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8396--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8396--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8396--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8396--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8396--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8396--   Scanning root segment: 0x701a000..0x701afff (4096)
--8396--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8396--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8396--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8396--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8396--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8396--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8396--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8396--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
--8397-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8397== 
==8397== HEAP SUMMARY:
==8397==     in use at exit: 3,006,086 bytes in 68,429 blocks
==8397==   total heap usage: 831,152 allocs, 762,723 frees, 57,041,470 bytes allocated
==8397== 
==8397== Searching for pointers to 68,429 not-freed blocks
--8397--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8397--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8397--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8397--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8397--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8397--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8397--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8397--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8397--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8397--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8397--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8397--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8397--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8397--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8397--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8397--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8397--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8397--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8397--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8397--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8397--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8397--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8397--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8397--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8397--   Scanning root segment: 0x701a000..0x701afff (4096)
--8397--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8397--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8397--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8397--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8397--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8397--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8397--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8397--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8396== Checked 4,726,424 bytes
==8396== 
==8396== LEAK SUMMARY:
==8396==    definitely lost: 253 bytes in 4 blocks
==8396==    indirectly lost: 6,756 bytes in 7 blocks
==8396==      possibly lost: 0 bytes in 0 blocks
==8396==    still reachable: 3,010,035 bytes in 68,811 blocks
==8396==         suppressed: 0 bytes in 0 blocks
==8396== Rerun with --leak-check=full to see details of leaked memory
==8396== 
==8396== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8396== 
==8396== 1 errors in context 1 of 1:
==8396== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8396==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8396==    by 0x488CD0: stringsubst (subst.c:301)
==8396==    by 0x48801B: prefork (subst.c:77)
==8396==    by 0x42B318: execcmd (exec.c:2619)
==8396==    by 0x428CA0: execpline2 (exec.c:1697)
==8396==    by 0x427FD2: execpline (exec.c:1484)
==8396==    by 0x427756: execlist (exec.c:1267)
==8396==    by 0x42717C: execode (exec.c:1073)
==8396==    by 0x431299: runshfunc (exec.c:5040)
==8396==    by 0x430E76: doshfunc (exec.c:4920)
==8396==    by 0x4302FB: execshfunc (exec.c:4557)
==8396==    by 0x42D8C1: execcmd (exec.c:3373)
==8396== 
==8396== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8395-- Caught __NR_exit; running __libc_freeres()
==8397== Checked 4,641,936 bytes
==8397== 
==8397== LEAK SUMMARY:
==8397==    definitely lost: 253 bytes in 4 blocks
==8397==    indirectly lost: 6,756 bytes in 7 blocks
==8397==      possibly lost: 0 bytes in 0 blocks
==8397==    still reachable: 2,999,077 bytes in 68,418 blocks
==8397==         suppressed: 0 bytes in 0 blocks
==8397== Rerun with --leak-check=full to see details of leaked memory
==8397== 
==8397== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8397== 
==8397== 1 errors in context 1 of 1:
==8397== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8397==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8397==    by 0x488CD0: stringsubst (subst.c:301)
==8397==    by 0x48801B: prefork (subst.c:77)
==8397==    by 0x42B318: execcmd (exec.c:2619)
==8397==    by 0x428CA0: execpline2 (exec.c:1697)
==8397==    by 0x427FD2: execpline (exec.c:1484)
==8397==    by 0x427756: execlist (exec.c:1267)
==8397==    by 0x42717C: execode (exec.c:1073)
==8397==    by 0x431299: runshfunc (exec.c:5040)
==8397==    by 0x430E76: doshfunc (exec.c:4920)
==8397==    by 0x4302FB: execshfunc (exec.c:4557)
==8397==    by 0x42D8C1: execcmd (exec.c:3373)
==8397== 
==8397== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8395-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8395== 
==8395== HEAP SUMMARY:
==8395==     in use at exit: 3,014,944 bytes in 68,743 blocks
==8395==   total heap usage: 834,325 allocs, 765,582 frees, 58,713,253 bytes allocated
==8395== 
==8398== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8398-by-pythonnut-on-???
==8398== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8398-by-pythonnut-on-???
==8398== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8398-by-pythonnut-on-???
==8398== 
==8398== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8398== don't want to do, unless you know exactly what you're doing,
==8398== or are doing some strange experiment):
==8398==   /usr/lib/valgrind/../../bin/vgdb --pid=8398 ...command...
==8398== 
==8398== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8398==   /path/to/gdb ./zsh
==8398== and then give GDB the following command
==8398==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8398
==8398== --pid is optional if only one valgrind process is running
==8398== 
==8395== Searching for pointers to 68,743 not-freed blocks
--8395--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8395--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8395--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8395--   Scanning root segment: 0x4037000..0x403efff (32768)
--8395--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8395--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8395--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8395--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8395--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8395--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8395--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8395--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8395--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8395--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8395--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8395--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8395--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8395--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8395--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8395--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8395--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8395--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8395--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8395--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8395--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8395--   Scanning root segment: 0x701a000..0x701afff (4096)
--8395--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8395--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8395--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8395--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8395--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8395--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8395--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8395--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8399-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==8399== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8399-by-pythonnut-on-???
==8399== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8399-by-pythonnut-on-???
==8399== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8399-by-pythonnut-on-???
==8399== 
==8399== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8399== don't want to do, unless you know exactly what you're doing,
==8399== or are doing some strange experiment):
==8399==   /usr/lib/valgrind/../../bin/vgdb --pid=8399 ...command...
==8399== 
==8399== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8399==   /path/to/gdb ./zsh
==8399== and then give GDB the following command
==8399==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8399
==8399== --pid is optional if only one valgrind process is running
==8399== 
--8399-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8399== 
==8399== HEAP SUMMARY:
==8399==     in use at exit: 3,010,269 bytes in 68,529 blocks
==8399==   total heap usage: 831,069 allocs, 762,540 frees, 57,027,560 bytes allocated
==8399== 
==8399== Searching for pointers to 68,529 not-freed blocks
--8399--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8399--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8399--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8399--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8399--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8399--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8399--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8399--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8399--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8399--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8399--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8399--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8399--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8399--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8399--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8399--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8399--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8399--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8399--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8399--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8399--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8399--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8399--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8399--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8399--   Scanning root segment: 0x701a000..0x701afff (4096)
--8399--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8399--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8399--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8399--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8399--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8399--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8399--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8399--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8395== Checked 4,706,224 bytes
==8395== 
==8395== LEAK SUMMARY:
==8395==    definitely lost: 253 bytes in 4 blocks
==8395==    indirectly lost: 6,756 bytes in 7 blocks
==8395==      possibly lost: 0 bytes in 0 blocks
==8395==    still reachable: 3,007,935 bytes in 68,732 blocks
==8395==         suppressed: 0 bytes in 0 blocks
==8395== Rerun with --leak-check=full to see details of leaked memory
==8395== 
==8395== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8395== 
==8395== 1 errors in context 1 of 1:
==8395== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8395==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8395==    by 0x488CD0: stringsubst (subst.c:301)
==8395==    by 0x48801B: prefork (subst.c:77)
==8395==    by 0x42B318: execcmd (exec.c:2619)
==8395==    by 0x428CA0: execpline2 (exec.c:1697)
==8395==    by 0x427FD2: execpline (exec.c:1484)
==8395==    by 0x427756: execlist (exec.c:1267)
==8395==    by 0x42717C: execode (exec.c:1073)
==8395==    by 0x431299: runshfunc (exec.c:5040)
==8395==    by 0x430E76: doshfunc (exec.c:4920)
==8395==    by 0x4302FB: execshfunc (exec.c:4557)
==8395==    by 0x42D8C1: execcmd (exec.c:3373)
==8395== 
==8395== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8401== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8401-by-pythonnut-on-???
==8401== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8401-by-pythonnut-on-???
==8401== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8401-by-pythonnut-on-???
==8401== 
==8401== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8401== don't want to do, unless you know exactly what you're doing,
==8401== or are doing some strange experiment):
==8401==   /usr/lib/valgrind/../../bin/vgdb --pid=8401 ...command...
==8401== 
==8401== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8401==   /path/to/gdb ./zsh
==8401== and then give GDB the following command
==8401==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8401
==8401== --pid is optional if only one valgrind process is running
==8401== 
==8402== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8402-by-pythonnut-on-???
==8402== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8402-by-pythonnut-on-???
==8402== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8402-by-pythonnut-on-???
==8402== 
==8402== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8402== don't want to do, unless you know exactly what you're doing,
==8402== or are doing some strange experiment):
==8402==   /usr/lib/valgrind/../../bin/vgdb --pid=8402 ...command...
==8402== 
==8402== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8402==   /path/to/gdb ./zsh
==8402== and then give GDB the following command
==8402==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8402
==8402== --pid is optional if only one valgrind process is running
==8402== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
--8402-- Caught __NR_exit; running __libc_freeres()
==8399== Checked 4,652,512 bytes
==8399== 
--8402-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8399== LEAK SUMMARY:
==8399==    definitely lost: 253 bytes in 4 blocks
==8399==    indirectly lost: 6,756 bytes in 7 blocks
==8399==      possibly lost: 0 bytes in 0 blocks
==8399==    still reachable: 3,003,260 bytes in 68,518 blocks
==8399==         suppressed: 0 bytes in 0 blocks
==8399== Rerun with --leak-check=full to see details of leaked memory
==8399== 
==8399== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8399== 
==8399== 1 errors in context 1 of 1:
==8399== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8399==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8399==    by 0x488CD0: stringsubst (subst.c:301)
==8399==    by 0x48801B: prefork (subst.c:77)
==8399==    by 0x42B318: execcmd (exec.c:2619)
==8399==    by 0x428CA0: execpline2 (exec.c:1697)
==8399==    by 0x427FD2: execpline (exec.c:1484)
==8399==    by 0x427756: execlist (exec.c:1267)
==8399==    by 0x42717C: execode (exec.c:1073)
==8399==    by 0x431299: runshfunc (exec.c:5040)
==8399==    by 0x430E76: doshfunc (exec.c:4920)
==8399==    by 0x4302FB: execshfunc (exec.c:4557)
==8399==    by 0x42D8C1: execcmd (exec.c:3373)
==8399== 
==8399== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8402== 
==8402== HEAP SUMMARY:
==8402==     in use at exit: 3,016,995 bytes in 68,822 blocks
==8402==   total heap usage: 834,429 allocs, 765,607 frees, 58,783,556 bytes allocated
==8402== 
--8398-- Caught __NR_exit; running __libc_freeres()
--8398-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8402== Searching for pointers to 68,822 not-freed blocks
--8402--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8402--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8402--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8402--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8402--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8402--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8402--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8402--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8402--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8402--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8402--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8402--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8402--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8402--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8402--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8402--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8402--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8402--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8402--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8402--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8402--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8402--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8402--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8402--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8402--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8402--   Scanning root segment: 0x701a000..0x701afff (4096)
--8402--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8402--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8402--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8402--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8402--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8402--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8402--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8402--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8398== 
==8398== HEAP SUMMARY:
==8398==     in use at exit: 3,010,205 bytes in 68,526 blocks
==8398==   total heap usage: 831,067 allocs, 762,541 frees, 57,027,319 bytes allocated
==8398== 
==8398== Searching for pointers to 68,526 not-freed blocks
--8398--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8398--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8398--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8398--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8398--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8398--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8398--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8398--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8398--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8398--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8398--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8398--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8398--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8398--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8398--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8398--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8398--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8398--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8398--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8398--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8398--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8398--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8398--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8398--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8398--   Scanning root segment: 0x701a000..0x701afff (4096)
--8398--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8398--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8398--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8398--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8398--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8398--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8398--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8398--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8402== Checked 4,726,376 bytes
==8402== 
==8402== LEAK SUMMARY:
==8402==    definitely lost: 253 bytes in 4 blocks
==8402==    indirectly lost: 6,756 bytes in 7 blocks
==8402==      possibly lost: 0 bytes in 0 blocks
==8402==    still reachable: 3,009,986 bytes in 68,811 blocks
==8402==         suppressed: 0 bytes in 0 blocks
==8402== Rerun with --leak-check=full to see details of leaked memory
==8402== 
==8402== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8402== 
==8402== 1 errors in context 1 of 1:
==8402== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8402==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8402==    by 0x488CD0: stringsubst (subst.c:301)
==8402==    by 0x48801B: prefork (subst.c:77)
==8402==    by 0x42B318: execcmd (exec.c:2619)
==8402==    by 0x428CA0: execpline2 (exec.c:1697)
==8402==    by 0x427FD2: execpline (exec.c:1484)
==8402==    by 0x427756: execlist (exec.c:1267)
==8402==    by 0x42717C: execode (exec.c:1073)
==8402==    by 0x431299: runshfunc (exec.c:5040)
==8402==    by 0x430E76: doshfunc (exec.c:4920)
==8402==    by 0x4302FB: execshfunc (exec.c:4557)
==8402==    by 0x42D8C1: execcmd (exec.c:3373)
==8402== 
==8402== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8401-- Caught __NR_exit; running __libc_freeres()
==8398== Checked 4,651,824 bytes
==8398== 
==8398== LEAK SUMMARY:
==8398==    definitely lost: 253 bytes in 4 blocks
==8398==    indirectly lost: 6,756 bytes in 7 blocks
==8398==      possibly lost: 0 bytes in 0 blocks
==8398==    still reachable: 3,003,196 bytes in 68,515 blocks
==8398==         suppressed: 0 bytes in 0 blocks
==8398== Rerun with --leak-check=full to see details of leaked memory
==8398== 
==8398== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8398== 
==8398== 1 errors in context 1 of 1:
==8398== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8398==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8398==    by 0x488CD0: stringsubst (subst.c:301)
==8398==    by 0x48801B: prefork (subst.c:77)
==8398==    by 0x42B318: execcmd (exec.c:2619)
==8398==    by 0x428CA0: execpline2 (exec.c:1697)
==8398==    by 0x427FD2: execpline (exec.c:1484)
==8398==    by 0x427756: execlist (exec.c:1267)
==8398==    by 0x42717C: execode (exec.c:1073)
==8398==    by 0x431299: runshfunc (exec.c:5040)
==8398==    by 0x430E76: doshfunc (exec.c:4920)
==8398==    by 0x4302FB: execshfunc (exec.c:4557)
==8398==    by 0x42D8C1: execcmd (exec.c:3373)
==8398== 
==8398== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8401-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8401== 
==8401== HEAP SUMMARY:
==8401==     in use at exit: 3,014,929 bytes in 68,743 blocks
==8401==   total heap usage: 834,336 allocs, 765,593 frees, 58,716,009 bytes allocated
==8401== 
--8403-- Caught __NR_exit; running __libc_freeres()
==8403== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8403-by-pythonnut-on-???
==8403== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8403-by-pythonnut-on-???
==8403== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8403-by-pythonnut-on-???
==8403== 
==8403== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8403== don't want to do, unless you know exactly what you're doing,
==8403== or are doing some strange experiment):
==8403==   /usr/lib/valgrind/../../bin/vgdb --pid=8403 ...command...
==8403== 
==8403== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8403==   /path/to/gdb ./zsh
==8403== and then give GDB the following command
==8403==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8403
==8403== --pid is optional if only one valgrind process is running
==8403== 
==8401== Searching for pointers to 68,743 not-freed blocks
--8401--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8401--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8401--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8401--   Scanning root segment: 0x4037000..0x403efff (32768)
--8401--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8401--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8401--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8401--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8401--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8401--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8401--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8401--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8401--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8401--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8401--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8401--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8401--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8401--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8401--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8401--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8401--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8401--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8401--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8401--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8401--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8401--   Scanning root segment: 0x701a000..0x701afff (4096)
--8401--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8401--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8401--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8401--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8401--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8401--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8401--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8401--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8403-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8403== 
==8403== HEAP SUMMARY:
==8403==     in use at exit: 3,010,212 bytes in 68,526 blocks
==8403==   total heap usage: 831,082 allocs, 762,556 frees, 57,032,317 bytes allocated
==8403== 
==8403== Searching for pointers to 68,526 not-freed blocks
--8403--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8403--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8403--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8403--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8403--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8403--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8403--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8403--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8403--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8403--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8403--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8403--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8403--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8403--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8403--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8403--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8403--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8403--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8403--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8403--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8403--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8403--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8403--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8403--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8403--   Scanning root segment: 0x701a000..0x701afff (4096)
--8403--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8403--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8403--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8403--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8403--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8403--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8403--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8403--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8401== Checked 4,706,208 bytes
==8401== 
==8401== LEAK SUMMARY:
==8401==    definitely lost: 253 bytes in 4 blocks
==8401==    indirectly lost: 6,756 bytes in 7 blocks
==8401==      possibly lost: 0 bytes in 0 blocks
==8401==    still reachable: 3,007,920 bytes in 68,732 blocks
==8401==         suppressed: 0 bytes in 0 blocks
==8401== Rerun with --leak-check=full to see details of leaked memory
==8401== 
==8401== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8401== 
==8401== 1 errors in context 1 of 1:
==8401== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8401==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8401==    by 0x488CD0: stringsubst (subst.c:301)
==8401==    by 0x48801B: prefork (subst.c:77)
==8401==    by 0x42B318: execcmd (exec.c:2619)
==8401==    by 0x428CA0: execpline2 (exec.c:1697)
==8401==    by 0x427FD2: execpline (exec.c:1484)
==8401==    by 0x427756: execlist (exec.c:1267)
==8401==    by 0x42717C: execode (exec.c:1073)
==8401==    by 0x431299: runshfunc (exec.c:5040)
==8401==    by 0x430E76: doshfunc (exec.c:4920)
==8401==    by 0x4302FB: execshfunc (exec.c:4557)
==8401==    by 0x42D8C1: execcmd (exec.c:3373)
==8401== 
==8401== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8404== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8404-by-pythonnut-on-???
==8404== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8404-by-pythonnut-on-???
==8404== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8404-by-pythonnut-on-???
==8404== 
==8404== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8404== don't want to do, unless you know exactly what you're doing,
==8404== or are doing some strange experiment):
==8404==   /usr/lib/valgrind/../../bin/vgdb --pid=8404 ...command...
==8404== 
==8404== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8404==   /path/to/gdb ./zsh
==8404== and then give GDB the following command
==8404==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8404
==8404== --pid is optional if only one valgrind process is running
==8404== 
==8405== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8405-by-pythonnut-on-???
==8405== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8405-by-pythonnut-on-???
==8405== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8405-by-pythonnut-on-???
==8405== 
==8405== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8405== don't want to do, unless you know exactly what you're doing,
==8405== or are doing some strange experiment):
==8405==   /usr/lib/valgrind/../../bin/vgdb --pid=8405 ...command...
==8405== 
==8405== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8405==   /path/to/gdb ./zsh
==8405== and then give GDB the following command
==8405==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8405
==8405== --pid is optional if only one valgrind process is running
==8405== 
==8403== Checked 4,651,960 bytes
==8403== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8403== LEAK SUMMARY:
==8403==    definitely lost: 253 bytes in 4 blocks
==8403==    indirectly lost: 6,756 bytes in 7 blocks
==8403==      possibly lost: 0 bytes in 0 blocks
==8403==    still reachable: 3,003,203 bytes in 68,515 blocks
==8403==         suppressed: 0 bytes in 0 blocks
==8403== Rerun with --leak-check=full to see details of leaked memory
==8403== 
==8403== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8403== 
==8403== 1 errors in context 1 of 1:
==8403== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8403==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8403==    by 0x488CD0: stringsubst (subst.c:301)
==8403==    by 0x48801B: prefork (subst.c:77)
==8403==    by 0x42B318: execcmd (exec.c:2619)
==8403==    by 0x428CA0: execpline2 (exec.c:1697)
==8403==    by 0x427FD2: execpline (exec.c:1484)
==8403==    by 0x427756: execlist (exec.c:1267)
==8403==    by 0x42717C: execode (exec.c:1073)
==8403==    by 0x431299: runshfunc (exec.c:5040)
==8403==    by 0x430E76: doshfunc (exec.c:4920)
==8403==    by 0x4302FB: execshfunc (exec.c:4557)
==8403==    by 0x42D8C1: execcmd (exec.c:3373)
==8403== 
==8403== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8405-- Caught __NR_exit; running __libc_freeres()
--8406-- Caught __NR_exit; running __libc_freeres()
--8405-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8406== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8406-by-pythonnut-on-???
==8405== 
==8406== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8406-by-pythonnut-on-???
==8406== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8406-by-pythonnut-on-???
==8406== 
==8406== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8406== don't want to do, unless you know exactly what you're doing,
==8406== or are doing some strange experiment):
==8406==   /usr/lib/valgrind/../../bin/vgdb --pid=8406 ...command...
==8406== 
==8406== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8406==   /path/to/gdb ./zsh
==8406== and then give GDB the following command
==8406==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8406
==8406== --pid is optional if only one valgrind process is running
==8406== 
==8405== HEAP SUMMARY:
==8405==     in use at exit: 3,016,944 bytes in 68,822 blocks
==8405==   total heap usage: 834,440 allocs, 765,618 frees, 58,753,446 bytes allocated
==8405== 
--8406-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8406== 
==8406== HEAP SUMMARY:
==8406==     in use at exit: 3,010,308 bytes in 68,526 blocks
==8406==   total heap usage: 831,098 allocs, 762,572 frees, 57,037,104 bytes allocated
==8406== 
==8405== Searching for pointers to 68,822 not-freed blocks
--8405--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8405--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8405--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8405--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8405--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8405--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8405--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8405--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8405--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8405--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8405--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8405--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8405--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8405--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8405--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8405--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8405--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8405--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8405--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8405--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8405--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8405--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8405--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8405--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8405--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8405--   Scanning root segment: 0x701a000..0x701afff (4096)
--8405--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8405--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8405--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8405--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8405--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8405--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8405--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8405--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8406== Searching for pointers to 68,526 not-freed blocks
--8406--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8406--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8406--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8406--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8406--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8406--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8406--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8406--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8406--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8406--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8406--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8406--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8406--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8406--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8406--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8406--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8406--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8406--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8406--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8406--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8406--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8406--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8406--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8406--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8406--   Scanning root segment: 0x701a000..0x701afff (4096)
--8406--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8406--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8406--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8406--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8406--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8406--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8406--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8406--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8405== Checked 4,726,328 bytes
==8405== 
==8405== LEAK SUMMARY:
==8405==    definitely lost: 253 bytes in 4 blocks
==8405==    indirectly lost: 6,756 bytes in 7 blocks
==8405==      possibly lost: 0 bytes in 0 blocks
==8405==    still reachable: 3,009,935 bytes in 68,811 blocks
==8405==         suppressed: 0 bytes in 0 blocks
==8405== Rerun with --leak-check=full to see details of leaked memory
==8405== 
==8405== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8405== 
==8405== 1 errors in context 1 of 1:
==8405== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8405==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8405==    by 0x488CD0: stringsubst (subst.c:301)
==8405==    by 0x48801B: prefork (subst.c:77)
==8405==    by 0x42B318: execcmd (exec.c:2619)
==8405==    by 0x428CA0: execpline2 (exec.c:1697)
==8405==    by 0x427FD2: execpline (exec.c:1484)
==8405==    by 0x427756: execlist (exec.c:1267)
==8405==    by 0x42717C: execode (exec.c:1073)
==8405==    by 0x431299: runshfunc (exec.c:5040)
==8405==    by 0x430E76: doshfunc (exec.c:4920)
==8405==    by 0x4302FB: execshfunc (exec.c:4557)
==8405==    by 0x42D8C1: execcmd (exec.c:3373)
==8405== 
==8405== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8406== Checked 4,651,240 bytes
==8406== 
--8404-- Caught __NR_exit; running __libc_freeres()
==8406== LEAK SUMMARY:
==8406==    definitely lost: 253 bytes in 4 blocks
==8406==    indirectly lost: 6,756 bytes in 7 blocks
==8406==      possibly lost: 0 bytes in 0 blocks
==8406==    still reachable: 3,003,299 bytes in 68,515 blocks
==8406==         suppressed: 0 bytes in 0 blocks
==8406== Rerun with --leak-check=full to see details of leaked memory
==8406== 
==8406== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8406== 
==8406== 1 errors in context 1 of 1:
==8406== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8406==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8406==    by 0x488CD0: stringsubst (subst.c:301)
==8406==    by 0x48801B: prefork (subst.c:77)
==8406==    by 0x42B318: execcmd (exec.c:2619)
==8406==    by 0x428CA0: execpline2 (exec.c:1697)
==8406==    by 0x427FD2: execpline (exec.c:1484)
==8406==    by 0x427756: execlist (exec.c:1267)
==8406==    by 0x42717C: execode (exec.c:1073)
==8406==    by 0x431299: runshfunc (exec.c:5040)
==8406==    by 0x430E76: doshfunc (exec.c:4920)
==8406==    by 0x4302FB: execshfunc (exec.c:4557)
==8406==    by 0x42D8C1: execcmd (exec.c:3373)
==8406== 
==8406== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8404-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8404== 
==8404== HEAP SUMMARY:
==8404==     in use at exit: 3,014,912 bytes in 68,743 blocks
==8404==   total heap usage: 834,347 allocs, 765,604 frees, 58,718,748 bytes allocated
==8404== 
==8407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8407-by-pythonnut-on-???
==8407== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8407-by-pythonnut-on-???
==8407== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8407-by-pythonnut-on-???
==8407== 
==8407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8407== don't want to do, unless you know exactly what you're doing,
==8407== or are doing some strange experiment):
==8407==   /usr/lib/valgrind/../../bin/vgdb --pid=8407 ...command...
==8407== 
==8407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8407==   /path/to/gdb ./zsh
==8407== and then give GDB the following command
==8407==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8407
==8407== --pid is optional if only one valgrind process is running
==8407== 
--8407-- Caught __NR_exit; running __libc_freeres()
==8404== Searching for pointers to 68,743 not-freed blocks
--8404--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8404--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8404--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8404--   Scanning root segment: 0x4037000..0x403efff (32768)
--8404--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8404--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8404--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8404--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8404--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8404--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8404--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8404--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8404--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8404--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8404--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8404--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8404--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8404--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8404--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8404--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8404--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8404--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8404--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8404--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8404--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8404--   Scanning root segment: 0x701a000..0x701afff (4096)
--8404--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8404--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8404--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8404--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8404--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8404--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8404--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8404--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8407== 
==8407== HEAP SUMMARY:
==8407==     in use at exit: 3,010,614 bytes in 68,532 blocks
==8407==   total heap usage: 831,147 allocs, 762,615 frees, 57,046,184 bytes allocated
==8407== 
==8407== Searching for pointers to 68,532 not-freed blocks
--8407--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8407--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8407--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8407--   Scanning root segment: 0x4037000..0x403afff (16384)
--8407--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8407--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8407--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8407--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8407--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8407--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8407--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8407--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8407--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8407--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8407--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8407--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8407--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8407--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8407--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8407--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8407--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8407--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8407--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8407--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8407--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8407--   Scanning root segment: 0x701a000..0x701afff (4096)
--8407--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8407--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8407--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8407--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8407--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8407--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8407--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8407--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8404== Checked 4,706,200 bytes
==8404== 
==8404== LEAK SUMMARY:
==8404==    definitely lost: 253 bytes in 4 blocks
==8404==    indirectly lost: 6,756 bytes in 7 blocks
==8404==      possibly lost: 0 bytes in 0 blocks
==8404==    still reachable: 3,007,903 bytes in 68,732 blocks
==8404==         suppressed: 0 bytes in 0 blocks
==8404== Rerun with --leak-check=full to see details of leaked memory
==8404== 
==8404== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8404== 
==8404== 1 errors in context 1 of 1:
==8404== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8404==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8404==    by 0x488CD0: stringsubst (subst.c:301)
==8404==    by 0x48801B: prefork (subst.c:77)
==8404==    by 0x42B318: execcmd (exec.c:2619)
==8404==    by 0x428CA0: execpline2 (exec.c:1697)
==8404==    by 0x427FD2: execpline (exec.c:1484)
==8404==    by 0x427756: execlist (exec.c:1267)
==8404==    by 0x42717C: execode (exec.c:1073)
==8404==    by 0x431299: runshfunc (exec.c:5040)
==8404==    by 0x430E76: doshfunc (exec.c:4920)
==8404==    by 0x4302FB: execshfunc (exec.c:4557)
==8404==    by 0x42D8C1: execcmd (exec.c:3373)
==8404== 
==8404== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8408-by-pythonnut-on-???
==8408== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8408-by-pythonnut-on-???
==8408== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8408-by-pythonnut-on-???
==8408== 
==8408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8408== don't want to do, unless you know exactly what you're doing,
==8408== or are doing some strange experiment):
==8408==   /usr/lib/valgrind/../../bin/vgdb --pid=8408 ...command...
==8408== 
==8408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8408==   /path/to/gdb ./zsh
==8408== and then give GDB the following command
==8408==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8408
==8408== --pid is optional if only one valgrind process is running
==8408== 
==8407== Checked 4,667,840 bytes
==8407== 
==8409== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8409-by-pythonnut-on-???
==8407== LEAK SUMMARY:
==8409== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8409-by-pythonnut-on-???
==8407==    definitely lost: 253 bytes in 4 blocks
==8409== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8409-by-pythonnut-on-???
==8407==    indirectly lost: 6,756 bytes in 7 blocks
==8409== 
==8407==      possibly lost: 0 bytes in 0 blocks
==8409== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8409== don't want to do, unless you know exactly what you're doing,
==8409== or are doing some strange experiment):
==8409==   /usr/lib/valgrind/../../bin/vgdb --pid=8409 ...command...
==8407==    still reachable: 3,003,605 bytes in 68,521 blocks
==8409== 
==8407==         suppressed: 0 bytes in 0 blocks
==8407== Rerun with --leak-check=full to see details of leaked memory
==8409== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8409==   /path/to/gdb ./zsh
==8409== and then give GDB the following command
==8409==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8409
==8407== 
==8409== --pid is optional if only one valgrind process is running
==8409== 
==8407== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8407== 
==8407== 1 errors in context 1 of 1:
==8407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8407==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8407==    by 0x488CD0: stringsubst (subst.c:301)
==8407==    by 0x48801B: prefork (subst.c:77)
==8407==    by 0x42B318: execcmd (exec.c:2619)
==8407==    by 0x428CA0: execpline2 (exec.c:1697)
==8407==    by 0x427FD2: execpline (exec.c:1484)
==8407==    by 0x427756: execlist (exec.c:1267)
==8407==    by 0x42717C: execode (exec.c:1073)
==8407==    by 0x431299: runshfunc (exec.c:5040)
==8407==    by 0x430E76: doshfunc (exec.c:4920)
==8407==    by 0x4302FB: execshfunc (exec.c:4557)
==8407==    by 0x42D8C1: execcmd (exec.c:3373)
==8407== 
==8407== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
--8409-- Caught __NR_exit; running __libc_freeres()
--8410-- Caught __NR_exit; running __libc_freeres()
--8409-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8410== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8410-by-pythonnut-on-???
==8410== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8410-by-pythonnut-on-???
==8410== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8410-by-pythonnut-on-???
==8410== 
==8410== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8410== don't want to do, unless you know exactly what you're doing,
==8410== or are doing some strange experiment):
==8410==   /usr/lib/valgrind/../../bin/vgdb --pid=8410 ...command...
==8410== 
==8410== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8410==   /path/to/gdb ./zsh
==8410== and then give GDB the following command
==8410==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8410
==8410== --pid is optional if only one valgrind process is running
==8410== 
==8409== 
==8409== HEAP SUMMARY:
==8409==     in use at exit: 3,016,917 bytes in 68,822 blocks
==8409==   total heap usage: 834,450 allocs, 765,628 frees, 58,723,325 bytes allocated
==8409== 
--8410-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8410== 
==8410== HEAP SUMMARY:
==8410==     in use at exit: 3,010,518 bytes in 68,532 blocks
==8410==   total heap usage: 831,127 allocs, 762,595 frees, 57,043,954 bytes allocated
==8410== 
==8409== Searching for pointers to 68,822 not-freed blocks
--8409--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8409--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8409--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8409--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8409--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8409--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8409--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8409--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8409--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8409--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8409--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8409--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8409--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8409--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8409--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8409--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8409--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8409--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8409--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8409--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8409--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8409--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8409--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8409--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8409--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8409--   Scanning root segment: 0x701a000..0x701afff (4096)
--8409--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8409--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8409--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8409--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8409--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8409--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8409--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8409--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8410== Searching for pointers to 68,532 not-freed blocks
--8410--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8410--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8410--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8410--   Scanning root segment: 0x4037000..0x403afff (16384)
--8410--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8410--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8410--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8410--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8410--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8410--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8410--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8410--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8410--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8410--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8410--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8410--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8410--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8410--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8410--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8410--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8410--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8410--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8410--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8410--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8410--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8410--   Scanning root segment: 0x701a000..0x701afff (4096)
--8410--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8410--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8410--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8410--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8410--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8410--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8410--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8410--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8409== Checked 4,726,288 bytes
==8409== 
==8409== LEAK SUMMARY:
==8409==    definitely lost: 253 bytes in 4 blocks
==8409==    indirectly lost: 6,756 bytes in 7 blocks
==8409==      possibly lost: 0 bytes in 0 blocks
==8409==    still reachable: 3,009,908 bytes in 68,811 blocks
==8409==         suppressed: 0 bytes in 0 blocks
==8409== Rerun with --leak-check=full to see details of leaked memory
==8409== 
==8409== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8409== 
==8409== 1 errors in context 1 of 1:
==8409== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8409==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8409==    by 0x488CD0: stringsubst (subst.c:301)
==8409==    by 0x48801B: prefork (subst.c:77)
==8409==    by 0x42B318: execcmd (exec.c:2619)
==8409==    by 0x428CA0: execpline2 (exec.c:1697)
==8409==    by 0x427FD2: execpline (exec.c:1484)
==8409==    by 0x427756: execlist (exec.c:1267)
==8409==    by 0x42717C: execode (exec.c:1073)
==8409==    by 0x431299: runshfunc (exec.c:5040)
==8409==    by 0x430E76: doshfunc (exec.c:4920)
==8409==    by 0x4302FB: execshfunc (exec.c:4557)
==8409==    by 0x42D8C1: execcmd (exec.c:3373)
==8409== 
==8409== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8410== Checked 4,667,728 bytes
==8410== 
--8408-- Caught __NR_exit; running __libc_freeres()
==8410== LEAK SUMMARY:
==8410==    definitely lost: 253 bytes in 4 blocks
==8410==    indirectly lost: 6,756 bytes in 7 blocks
==8410==      possibly lost: 0 bytes in 0 blocks
==8410==    still reachable: 3,003,509 bytes in 68,521 blocks
==8410==         suppressed: 0 bytes in 0 blocks
==8410== Rerun with --leak-check=full to see details of leaked memory
==8410== 
==8410== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8410== 
==8410== 1 errors in context 1 of 1:
==8410== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8410==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8410==    by 0x488CD0: stringsubst (subst.c:301)
==8410==    by 0x48801B: prefork (subst.c:77)
==8410==    by 0x42B318: execcmd (exec.c:2619)
==8410==    by 0x428CA0: execpline2 (exec.c:1697)
==8410==    by 0x427FD2: execpline (exec.c:1484)
==8410==    by 0x427756: execlist (exec.c:1267)
==8410==    by 0x42717C: execode (exec.c:1073)
==8410==    by 0x431299: runshfunc (exec.c:5040)
==8410==    by 0x430E76: doshfunc (exec.c:4920)
==8410==    by 0x4302FB: execshfunc (exec.c:4557)
==8410==    by 0x42D8C1: execcmd (exec.c:3373)
==8410== 
==8410== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8408== 
==8408== HEAP SUMMARY:
==8408==     in use at exit: 3,014,895 bytes in 68,743 blocks
==8408==   total heap usage: 834,357 allocs, 765,614 frees, 58,721,446 bytes allocated
==8408== 
==8411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8411-by-pythonnut-on-???
==8411== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8411-by-pythonnut-on-???
==8411== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8411-by-pythonnut-on-???
==8411== 
==8411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8411== don't want to do, unless you know exactly what you're doing,
==8411== or are doing some strange experiment):
==8411==   /usr/lib/valgrind/../../bin/vgdb --pid=8411 ...command...
==8411== 
==8411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8411==   /path/to/gdb ./zsh
==8411== and then give GDB the following command
==8411==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8411
==8411== --pid is optional if only one valgrind process is running
==8411== 
--8411-- Caught __NR_exit; running __libc_freeres()
==8408== Searching for pointers to 68,743 not-freed blocks
--8408--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8408--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8408--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8408--   Scanning root segment: 0x4037000..0x403efff (32768)
--8408--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8408--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8408--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8408--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8408--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8408--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8408--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8408--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8408--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8408--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8408--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8408--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8408--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8408--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8408--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8408--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8408--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8408--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8408--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8408--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8408--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8408--   Scanning root segment: 0x701a000..0x701afff (4096)
--8408--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8408--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8408--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8408--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8408--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8408--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8408--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8408--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8411== 
==8411== HEAP SUMMARY:
==8411==     in use at exit: 3,010,553 bytes in 68,533 blocks
==8411==   total heap usage: 831,140 allocs, 762,607 frees, 57,046,648 bytes allocated
==8411== 
==8411== Searching for pointers to 68,533 not-freed blocks
--8411--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8411--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8411--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8411--   Scanning root segment: 0x4037000..0x403afff (16384)
--8411--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8411--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8411--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8411--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8411--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8411--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8411--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8411--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8411--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8411--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8411--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8411--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8411--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8411--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8411--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8411--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8411--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8411--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8411--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8411--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8411--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8411--   Scanning root segment: 0x701a000..0x701afff (4096)
--8411--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8411--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8411--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8411--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8411--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8411--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8411--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8411--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8408== Checked 4,706,168 bytes
==8408== 
==8408== LEAK SUMMARY:
==8408==    definitely lost: 253 bytes in 4 blocks
==8408==    indirectly lost: 6,756 bytes in 7 blocks
==8408==      possibly lost: 0 bytes in 0 blocks
==8408==    still reachable: 3,007,886 bytes in 68,732 blocks
==8408==         suppressed: 0 bytes in 0 blocks
==8408== Rerun with --leak-check=full to see details of leaked memory
==8408== 
==8408== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8408== 
==8408== 1 errors in context 1 of 1:
==8408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8408==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8408==    by 0x488CD0: stringsubst (subst.c:301)
==8408==    by 0x48801B: prefork (subst.c:77)
==8408==    by 0x42B318: execcmd (exec.c:2619)
==8408==    by 0x428CA0: execpline2 (exec.c:1697)
==8408==    by 0x427FD2: execpline (exec.c:1484)
==8408==    by 0x427756: execlist (exec.c:1267)
==8408==    by 0x42717C: execode (exec.c:1073)
==8408==    by 0x431299: runshfunc (exec.c:5040)
==8408==    by 0x430E76: doshfunc (exec.c:4920)
==8408==    by 0x4302FB: execshfunc (exec.c:4557)
==8408==    by 0x42D8C1: execcmd (exec.c:3373)
==8408== 
==8408== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
client request: code 4d430005,  addr 0xFFEFF762C,  len 4
client request: code 4d430005,  addr 0xFFEFF762C,  len 4
==8411== Checked 4,667,248 bytes
==8411== 
client request: code 4d430005,  addr 0xFFEFF5D6C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF5DCC,  len 4
client request: code 4d430005,  addr 0xFFEFF5DCC,  len 4
client request: code 4d430005,  addr 0xFFEFF5DCC,  len 4
client request: code 4d430005,  addr 0xFFEFF933C,  len 4
--8367-- Caught __NR_exit; running __libc_freeres()
==8411== LEAK SUMMARY:
==8411==    definitely lost: 253 bytes in 4 blocks
==8411==    indirectly lost: 6,756 bytes in 7 blocks
==8411==      possibly lost: 0 bytes in 0 blocks
==8411==    still reachable: 3,003,544 bytes in 68,522 blocks
==8411==         suppressed: 0 bytes in 0 blocks
==8411== Rerun with --leak-check=full to see details of leaked memory
==8411== 
==8411== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8411== 
==8411== 1 errors in context 1 of 1:
==8411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8411==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8411==    by 0x488CD0: stringsubst (subst.c:301)
==8411==    by 0x48801B: prefork (subst.c:77)
==8411==    by 0x42B318: execcmd (exec.c:2619)
==8411==    by 0x428CA0: execpline2 (exec.c:1697)
==8411==    by 0x427FD2: execpline (exec.c:1484)
==8411==    by 0x427756: execlist (exec.c:1267)
==8411==    by 0x42717C: execode (exec.c:1073)
==8411==    by 0x431299: runshfunc (exec.c:5040)
==8411==    by 0x430E76: doshfunc (exec.c:4920)
==8411==    by 0x4302FB: execshfunc (exec.c:4557)
==8411==    by 0x42D8C1: execcmd (exec.c:3373)
==8411== 
==8411== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==7806== Conditional jump or move depends on uninitialised value(s)
==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==7806==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==7806==    by 0x40EFC2: execbuiltin (builtin.c:450)
==7806==    by 0x42D8E9: execcmd (exec.c:3378)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x42779A: execlist (exec.c:1275)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==7806== 
--8367-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8367== 
==8367== HEAP SUMMARY:
==8367==     in use at exit: 3,011,560 bytes in 68,557 blocks
==8367==   total heap usage: 834,665 allocs, 766,108 frees, 58,773,806 bytes allocated
==8367== 
==8367== Searching for pointers to 68,557 not-freed blocks
--8367--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8367--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8367--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8367--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8367--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8367--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8367--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8367--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8367--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8367--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8367--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8367--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8367--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8367--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8367--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8367--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8367--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8367--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8367--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8367--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8367--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8367--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8367--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8367--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8367--   Scanning root segment: 0x701a000..0x701afff (4096)
--8367--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8367--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8367--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8367--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8367--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8367--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8367--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8367--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8367== Checked 4,663,160 bytes
==8367== 
==8367== LEAK SUMMARY:
==8367==    definitely lost: 253 bytes in 4 blocks
==8367==    indirectly lost: 6,756 bytes in 7 blocks
==8367==      possibly lost: 0 bytes in 0 blocks
==8367==    still reachable: 3,004,551 bytes in 68,546 blocks
==8367==         suppressed: 0 bytes in 0 blocks
==8367== Rerun with --leak-check=full to see details of leaked memory
==8367== 
==8367== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8367== 
==8367== 1 errors in context 1 of 1:
==8367== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8367==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8367==    by 0x488CD0: stringsubst (subst.c:301)
==8367==    by 0x48801B: prefork (subst.c:77)
==8367==    by 0x42B318: execcmd (exec.c:2619)
==8367==    by 0x428CA0: execpline2 (exec.c:1697)
==8367==    by 0x427FD2: execpline (exec.c:1484)
==8367==    by 0x427756: execlist (exec.c:1267)
==8367==    by 0x42717C: execode (exec.c:1073)
==8367==    by 0x431299: runshfunc (exec.c:5040)
==8367==    by 0x430E76: doshfunc (exec.c:4920)
==8367==    by 0x4302FB: execshfunc (exec.c:4557)
==8367==    by 0x42D8C1: execcmd (exec.c:3373)
==8367== 
==8367== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8363-- Caught __NR_exit; running __libc_freeres()
--8363-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8363== 
==8363== HEAP SUMMARY:
==8363==     in use at exit: 2,984,657 bytes in 68,307 blocks
==8363==   total heap usage: 830,648 allocs, 762,341 frees, 57,175,989 bytes allocated
==8363== 
==8363== Searching for pointers to 68,307 not-freed blocks
--8363--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8363--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8363--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8363--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8363--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8363--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8363--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8363--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8363--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8363--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8363--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8363--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8363--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8363--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8363--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8363--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8363--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8363--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8363--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8363--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8363--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8363--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8363--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8363--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8363--   Scanning root segment: 0x701a000..0x701afff (4096)
--8363--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8363--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8363--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8363--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8363--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8363--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8363--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8363--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8363== Checked 4,635,128 bytes
==8363== 
==8363== LEAK SUMMARY:
==8363==    definitely lost: 253 bytes in 4 blocks
==8363==    indirectly lost: 6,756 bytes in 7 blocks
==8363==      possibly lost: 0 bytes in 0 blocks
==8363==    still reachable: 2,977,648 bytes in 68,296 blocks
==8363==         suppressed: 0 bytes in 0 blocks
==8363== Rerun with --leak-check=full to see details of leaked memory
==8363== 
==8363== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8363== 
==8363== 1 errors in context 1 of 1:
==8363== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8363==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8363==    by 0x488CD0: stringsubst (subst.c:301)
==8363==    by 0x48801B: prefork (subst.c:77)
==8363==    by 0x42B318: execcmd (exec.c:2619)
==8363==    by 0x428CA0: execpline2 (exec.c:1697)
==8363==    by 0x427FD2: execpline (exec.c:1484)
==8363==    by 0x427756: execlist (exec.c:1267)
==8363==    by 0x42717C: execode (exec.c:1073)
==8363==    by 0x431299: runshfunc (exec.c:5040)
==8363==    by 0x430E76: doshfunc (exec.c:4920)
==8363==    by 0x4302FB: execshfunc (exec.c:4557)
==8363==    by 0x42D8C1: execcmd (exec.c:3373)
==8363== 
==8363== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8361-- Caught __NR_exit; running __libc_freeres()
--8361-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8361== 
==8361== HEAP SUMMARY:
==8361==     in use at exit: 2,983,798 bytes in 68,291 blocks
==8361==   total heap usage: 830,615 allocs, 762,324 frees, 57,166,116 bytes allocated
==8361== 
==8361== Searching for pointers to 68,291 not-freed blocks
--8361--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8361--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8361--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8361--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8361--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8361--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8361--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8361--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8361--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8361--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8361--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8361--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8361--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8361--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8361--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8361--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8361--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8361--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8361--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8361--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8361--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8361--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8361--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8361--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8361--   Scanning root segment: 0x701a000..0x701afff (4096)
--8361--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8361--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8361--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8361--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8361--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8361--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8361--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8361--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8361== Checked 4,631,120 bytes
==8361== 
==8361== LEAK SUMMARY:
==8361==    definitely lost: 253 bytes in 4 blocks
==8361==    indirectly lost: 6,756 bytes in 7 blocks
==8361==      possibly lost: 0 bytes in 0 blocks
==8361==    still reachable: 2,976,789 bytes in 68,280 blocks
==8361==         suppressed: 0 bytes in 0 blocks
==8361== Rerun with --leak-check=full to see details of leaked memory
==8361== 
==8361== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8361== 
==8361== 1 errors in context 1 of 1:
==8361== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8361==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8361==    by 0x488CD0: stringsubst (subst.c:301)
==8361==    by 0x48801B: prefork (subst.c:77)
==8361==    by 0x42B318: execcmd (exec.c:2619)
==8361==    by 0x428CA0: execpline2 (exec.c:1697)
==8361==    by 0x427FD2: execpline (exec.c:1484)
==8361==    by 0x427756: execlist (exec.c:1267)
==8361==    by 0x42717C: execode (exec.c:1073)
==8361==    by 0x431299: runshfunc (exec.c:5040)
==8361==    by 0x430E76: doshfunc (exec.c:4920)
==8361==    by 0x4302FB: execshfunc (exec.c:4557)
==8361==    by 0x42D8C1: execcmd (exec.c:3373)
==8361== 
==8361== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8412-by-pythonnut-on-???
==8412== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8412-by-pythonnut-on-???
==8412== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8412-by-pythonnut-on-???
==8412== 
==8412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8412== don't want to do, unless you know exactly what you're doing,
==8412== or are doing some strange experiment):
==8412==   /usr/lib/valgrind/../../bin/vgdb --pid=8412 ...command...
==8412== 
==8412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8412==   /path/to/gdb ./zsh
==8412== and then give GDB the following command
==8412==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8412
==8412== --pid is optional if only one valgrind process is running
==8412== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
--8413-- Caught __NR_exit; running __libc_freeres()
==8413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8413-by-pythonnut-on-???
==8413== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8413-by-pythonnut-on-???
==8413== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8413-by-pythonnut-on-???
==8413== 
==8413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8413== don't want to do, unless you know exactly what you're doing,
==8413== or are doing some strange experiment):
==8413==   /usr/lib/valgrind/../../bin/vgdb --pid=8413 ...command...
==8413== 
==8413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8413==   /path/to/gdb ./zsh
==8413== and then give GDB the following command
==8413==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8413
==8413== --pid is optional if only one valgrind process is running
==8413== 
--8413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8413== 
==8413== HEAP SUMMARY:
==8413==     in use at exit: 2,984,302 bytes in 68,303 blocks
==8413==   total heap usage: 830,603 allocs, 762,300 frees, 57,161,447 bytes allocated
==8413== 
==8413== Searching for pointers to 68,303 not-freed blocks
--8413--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8413--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8413--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8413--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8413--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8413--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8413--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8413--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8413--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8413--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8413--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8413--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8413--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8413--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8413--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8413--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8413--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8413--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8413--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8413--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8413--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8413--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8413--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8413--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8413--   Scanning root segment: 0x701a000..0x701afff (4096)
--8413--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8413--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8413--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8413--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8413--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8413--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8413--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8413--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8413== Checked 4,633,672 bytes
==8413== 
==8413== LEAK SUMMARY:
==8413==    definitely lost: 253 bytes in 4 blocks
==8413==    indirectly lost: 6,756 bytes in 7 blocks
==8413==      possibly lost: 0 bytes in 0 blocks
==8413==    still reachable: 2,977,293 bytes in 68,292 blocks
==8413==         suppressed: 0 bytes in 0 blocks
==8413== Rerun with --leak-check=full to see details of leaked memory
==8413== 
==8413== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8413== 
==8413== 1 errors in context 1 of 1:
==8413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8413==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8413==    by 0x488CD0: stringsubst (subst.c:301)
==8413==    by 0x48801B: prefork (subst.c:77)
==8413==    by 0x42B318: execcmd (exec.c:2619)
==8413==    by 0x428CA0: execpline2 (exec.c:1697)
==8413==    by 0x427FD2: execpline (exec.c:1484)
==8413==    by 0x427756: execlist (exec.c:1267)
==8413==    by 0x42717C: execode (exec.c:1073)
==8413==    by 0x431299: runshfunc (exec.c:5040)
==8413==    by 0x430E76: doshfunc (exec.c:4920)
==8413==    by 0x4302FB: execshfunc (exec.c:4557)
==8413==    by 0x42D8C1: execcmd (exec.c:3373)
==8413== 
==8413== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8415-by-pythonnut-on-???
==8415== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8415-by-pythonnut-on-???
==8415== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8415-by-pythonnut-on-???
==8415== 
==8415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8415== don't want to do, unless you know exactly what you're doing,
==8415== or are doing some strange experiment):
==8415==   /usr/lib/valgrind/../../bin/vgdb --pid=8415 ...command...
==8415== 
==8415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8415==   /path/to/gdb ./zsh
==8415== and then give GDB the following command
==8415==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8415
==8415== --pid is optional if only one valgrind process is running
==8415== 
--8415-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
client request: code 4d430005,  addr 0xFFEFFB37C,  len 4
client request: code 4d430005,  addr 0xFFEFF836C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF895C,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFEEBFC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
==8417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8417-by-pythonnut-on-???
==8417== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8417-by-pythonnut-on-???
==8417== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8417-by-pythonnut-on-???
==8417== 
==8417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8417== don't want to do, unless you know exactly what you're doing,
==8417== or are doing some strange experiment):
==8417==   /usr/lib/valgrind/../../bin/vgdb --pid=8417 ...command...
==8417== 
==8417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8417==   /path/to/gdb ./zsh
==8417== and then give GDB the following command
==8417==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8417
==8417== --pid is optional if only one valgrind process is running
==8417== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
==8418== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8418-by-pythonnut-on-???
==8418== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8418-by-pythonnut-on-???
==8418== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8418-by-pythonnut-on-???
==8418== 
==8418== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8418== don't want to do, unless you know exactly what you're doing,
==8418== or are doing some strange experiment):
==8418==   /usr/lib/valgrind/../../bin/vgdb --pid=8418 ...command...
==8418== 
==8418== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8418==   /path/to/gdb ./zsh
==8418== and then give GDB the following command
==8418==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8418
==8418== --pid is optional if only one valgrind process is running
==8418== 
--8418-- Caught __NR_exit; running __libc_freeres()
--8418-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8418== 
==8418== HEAP SUMMARY:
==8418==     in use at exit: 3,016,033 bytes in 68,800 blocks
==8418==   total heap usage: 834,352 allocs, 765,552 frees, 58,897,138 bytes allocated
==8418== 
==8418== Searching for pointers to 68,800 not-freed blocks
--8418--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8418--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8418--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8418--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8418--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8418--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8418--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8418--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8418--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8418--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8418--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8418--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8418--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8418--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8418--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8418--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8418--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8418--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8418--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8418--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8418--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8418--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8418--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8418--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8418--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8418--   Scanning root segment: 0x701a000..0x701afff (4096)
--8418--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8418--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8418--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8418--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8418--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8418--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8418--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8418--   Scanning root segment: 0xffeff0000..0xfff000fff (69632)
==8418== Checked 4,721,768 bytes
==8418== 
==8418== LEAK SUMMARY:
==8418==    definitely lost: 253 bytes in 4 blocks
==8418==    indirectly lost: 6,756 bytes in 7 blocks
==8418==      possibly lost: 0 bytes in 0 blocks
==8418==    still reachable: 3,009,024 bytes in 68,789 blocks
==8418==         suppressed: 0 bytes in 0 blocks
==8418== Rerun with --leak-check=full to see details of leaked memory
==8418== 
==8418== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8418== 
==8418== 1 errors in context 1 of 1:
==8418== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8418==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8418==    by 0x488CD0: stringsubst (subst.c:301)
==8418==    by 0x48801B: prefork (subst.c:77)
==8418==    by 0x42B318: execcmd (exec.c:2619)
==8418==    by 0x428CA0: execpline2 (exec.c:1697)
==8418==    by 0x427FD2: execpline (exec.c:1484)
==8418==    by 0x427756: execlist (exec.c:1267)
==8418==    by 0x42717C: execode (exec.c:1073)
==8418==    by 0x431299: runshfunc (exec.c:5040)
==8418==    by 0x430E76: doshfunc (exec.c:4920)
==8418==    by 0x4302FB: execshfunc (exec.c:4557)
==8418==    by 0x42D8C1: execcmd (exec.c:3373)
==8418== 
==8418== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8417-- Caught __NR_exit; running __libc_freeres()
--8417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8417== 
==8417== HEAP SUMMARY:
==8417==     in use at exit: 3,013,883 bytes in 68,721 blocks
==8417==   total heap usage: 834,261 allocs, 765,540 frees, 58,698,339 bytes allocated
==8417== 
==8417== Searching for pointers to 68,721 not-freed blocks
--8417--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8417--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8417--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8417--   Scanning root segment: 0x4037000..0x403efff (32768)
--8417--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8417--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8417--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8417--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8417--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8417--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8417--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8417--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8417--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8417--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8417--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8417--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8417--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8417--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8417--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8417--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8417--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8417--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8417--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8417--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8417--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8417--   Scanning root segment: 0x701a000..0x701afff (4096)
--8417--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8417--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8417--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8417--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8417--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8417--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8417--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8417--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8417== Checked 4,701,520 bytes
==8417== 
==8417== LEAK SUMMARY:
==8417==    definitely lost: 253 bytes in 4 blocks
==8417==    indirectly lost: 6,756 bytes in 7 blocks
==8417==      possibly lost: 0 bytes in 0 blocks
==8417==    still reachable: 3,006,874 bytes in 68,710 blocks
==8417==         suppressed: 0 bytes in 0 blocks
==8417== Rerun with --leak-check=full to see details of leaked memory
==8417== 
==8417== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8417== 
==8417== 1 errors in context 1 of 1:
==8417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8417==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8417==    by 0x488CD0: stringsubst (subst.c:301)
==8417==    by 0x48801B: prefork (subst.c:77)
==8417==    by 0x42B318: execcmd (exec.c:2619)
==8417==    by 0x428CA0: execpline2 (exec.c:1697)
==8417==    by 0x427FD2: execpline (exec.c:1484)
==8417==    by 0x427756: execlist (exec.c:1267)
==8417==    by 0x42717C: execode (exec.c:1073)
==8417==    by 0x431299: runshfunc (exec.c:5040)
==8417==    by 0x430E76: doshfunc (exec.c:4920)
==8417==    by 0x4302FB: execshfunc (exec.c:4557)
==8417==    by 0x42D8C1: execcmd (exec.c:3373)
==8417== 
==8417== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8419-by-pythonnut-on-???
==8419== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8419-by-pythonnut-on-???
==8419== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8419-by-pythonnut-on-???
==8419== 
==8419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8419== don't want to do, unless you know exactly what you're doing,
==8419== or are doing some strange experiment):
==8419==   /usr/lib/valgrind/../../bin/vgdb --pid=8419 ...command...
==8419== 
==8419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8419==   /path/to/gdb ./zsh
==8419== and then give GDB the following command
==8419==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8419
==8419== --pid is optional if only one valgrind process is running
==8419== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==8420== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8420-by-pythonnut-on-???
==8420== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8420-by-pythonnut-on-???
==8420== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8420-by-pythonnut-on-???
==8420== 
==8420== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8420== don't want to do, unless you know exactly what you're doing,
==8420== or are doing some strange experiment):
==8420==   /usr/lib/valgrind/../../bin/vgdb --pid=8420 ...command...
==8420== 
==8420== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8420==   /path/to/gdb ./zsh
==8420== and then give GDB the following command
==8420==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8420
==8420== --pid is optional if only one valgrind process is running
==8420== 
--8420-- Caught __NR_exit; running __libc_freeres()
--8420-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8420== 
==8420== HEAP SUMMARY:
==8420==     in use at exit: 3,016,236 bytes in 68,807 blocks
==8420==   total heap usage: 834,368 allocs, 765,561 frees, 58,867,251 bytes allocated
==8420== 
==8420== Searching for pointers to 68,807 not-freed blocks
--8420--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8420--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8420--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8420--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8420--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8420--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8420--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8420--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8420--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8420--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8420--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8420--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8420--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8420--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8420--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8420--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8420--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8420--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8420--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8420--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8420--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8420--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8420--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8420--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8420--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8420--   Scanning root segment: 0x701a000..0x701afff (4096)
--8420--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8420--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8420--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8420--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8420--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8420--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8420--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8420--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8420== Checked 4,722,456 bytes
==8420== 
==8420== LEAK SUMMARY:
==8420==    definitely lost: 253 bytes in 4 blocks
==8420==    indirectly lost: 6,756 bytes in 7 blocks
==8420==      possibly lost: 0 bytes in 0 blocks
==8420==    still reachable: 3,009,227 bytes in 68,796 blocks
==8420==         suppressed: 0 bytes in 0 blocks
==8420== Rerun with --leak-check=full to see details of leaked memory
==8420== 
==8420== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8420== 
==8420== 1 errors in context 1 of 1:
==8420== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8420==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8420==    by 0x488CD0: stringsubst (subst.c:301)
==8420==    by 0x48801B: prefork (subst.c:77)
==8420==    by 0x42B318: execcmd (exec.c:2619)
==8420==    by 0x428CA0: execpline2 (exec.c:1697)
==8420==    by 0x427FD2: execpline (exec.c:1484)
==8420==    by 0x427756: execlist (exec.c:1267)
==8420==    by 0x42717C: execode (exec.c:1073)
==8420==    by 0x431299: runshfunc (exec.c:5040)
==8420==    by 0x430E76: doshfunc (exec.c:4920)
==8420==    by 0x4302FB: execshfunc (exec.c:4557)
==8420==    by 0x42D8C1: execcmd (exec.c:3373)
==8420== 
==8420== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8419-- Caught __NR_exit; running __libc_freeres()
--8419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8419== 
==8419== HEAP SUMMARY:
==8419==     in use at exit: 3,014,096 bytes in 68,728 blocks
==8419==   total heap usage: 834,275 allocs, 765,547 frees, 58,701,192 bytes allocated
==8419== 
==8419== Searching for pointers to 68,728 not-freed blocks
--8419--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8419--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8419--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8419--   Scanning root segment: 0x4037000..0x403efff (32768)
--8419--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8419--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8419--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8419--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8419--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8419--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8419--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8419--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8419--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8419--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8419--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8419--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8419--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8419--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8419--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8419--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8419--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8419--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8419--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8419--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8419--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8419--   Scanning root segment: 0x701a000..0x701afff (4096)
--8419--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8419--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8419--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8419--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8419--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8419--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8419--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8419--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8419== Checked 4,702,232 bytes
==8419== 
==8419== LEAK SUMMARY:
==8419==    definitely lost: 253 bytes in 4 blocks
==8419==    indirectly lost: 6,756 bytes in 7 blocks
==8419==      possibly lost: 0 bytes in 0 blocks
==8419==    still reachable: 3,007,087 bytes in 68,717 blocks
==8419==         suppressed: 0 bytes in 0 blocks
==8419== Rerun with --leak-check=full to see details of leaked memory
==8419== 
==8419== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8419== 
==8419== 1 errors in context 1 of 1:
==8419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8419==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8419==    by 0x488CD0: stringsubst (subst.c:301)
==8419==    by 0x48801B: prefork (subst.c:77)
==8419==    by 0x42B318: execcmd (exec.c:2619)
==8419==    by 0x428CA0: execpline2 (exec.c:1697)
==8419==    by 0x427FD2: execpline (exec.c:1484)
==8419==    by 0x427756: execlist (exec.c:1267)
==8419==    by 0x42717C: execode (exec.c:1073)
==8419==    by 0x431299: runshfunc (exec.c:5040)
==8419==    by 0x430E76: doshfunc (exec.c:4920)
==8419==    by 0x4302FB: execshfunc (exec.c:4557)
==8419==    by 0x42D8C1: execcmd (exec.c:3373)
==8419== 
==8419== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8421== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8421-by-pythonnut-on-???
==8421== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8421-by-pythonnut-on-???
==8421== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8421-by-pythonnut-on-???
==8421== 
==8421== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8421== don't want to do, unless you know exactly what you're doing,
==8421== or are doing some strange experiment):
==8421==   /usr/lib/valgrind/../../bin/vgdb --pid=8421 ...command...
==8421== 
==8421== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8421==   /path/to/gdb ./zsh
==8421== and then give GDB the following command
==8421==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8421
==8421== --pid is optional if only one valgrind process is running
==8421== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==8422== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8422-by-pythonnut-on-???
==8422== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8422-by-pythonnut-on-???
==8422== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8422-by-pythonnut-on-???
==8422== 
==8422== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8422== don't want to do, unless you know exactly what you're doing,
==8422== or are doing some strange experiment):
==8422==   /usr/lib/valgrind/../../bin/vgdb --pid=8422 ...command...
==8422== 
==8422== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8422==   /path/to/gdb ./zsh
==8422== and then give GDB the following command
==8422==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8422
==8422== --pid is optional if only one valgrind process is running
==8422== 
--8422-- Caught __NR_exit; running __libc_freeres()
--8422-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8422== 
==8422== HEAP SUMMARY:
==8422==     in use at exit: 3,016,221 bytes in 68,807 blocks
==8422==   total heap usage: 834,379 allocs, 765,572 frees, 58,837,208 bytes allocated
==8422== 
==8422== Searching for pointers to 68,807 not-freed blocks
--8422--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8422--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8422--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8422--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8422--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8422--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8422--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8422--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8422--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8422--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8422--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8422--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8422--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8422--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8422--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8422--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8422--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8422--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8422--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8422--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8422--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8422--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8422--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8422--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8422--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8422--   Scanning root segment: 0x701a000..0x701afff (4096)
--8422--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8422--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8422--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8422--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8422--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8422--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8422--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8422--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8422== Checked 4,722,456 bytes
==8422== 
==8422== LEAK SUMMARY:
==8422==    definitely lost: 253 bytes in 4 blocks
==8422==    indirectly lost: 6,756 bytes in 7 blocks
==8422==      possibly lost: 0 bytes in 0 blocks
==8422==    still reachable: 3,009,212 bytes in 68,796 blocks
==8422==         suppressed: 0 bytes in 0 blocks
==8422== Rerun with --leak-check=full to see details of leaked memory
==8422== 
==8422== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8422== 
==8422== 1 errors in context 1 of 1:
==8422== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8422==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8422==    by 0x488CD0: stringsubst (subst.c:301)
==8422==    by 0x48801B: prefork (subst.c:77)
==8422==    by 0x42B318: execcmd (exec.c:2619)
==8422==    by 0x428CA0: execpline2 (exec.c:1697)
==8422==    by 0x427FD2: execpline (exec.c:1484)
==8422==    by 0x427756: execlist (exec.c:1267)
==8422==    by 0x42717C: execode (exec.c:1073)
==8422==    by 0x431299: runshfunc (exec.c:5040)
==8422==    by 0x430E76: doshfunc (exec.c:4920)
==8422==    by 0x4302FB: execshfunc (exec.c:4557)
==8422==    by 0x42D8C1: execcmd (exec.c:3373)
==8422== 
==8422== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8421-- Caught __NR_exit; running __libc_freeres()
--8421-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8421== 
==8421== HEAP SUMMARY:
==8421==     in use at exit: 3,014,091 bytes in 68,728 blocks
==8421==   total heap usage: 834,286 allocs, 765,558 frees, 58,703,968 bytes allocated
==8421== 
==8421== Searching for pointers to 68,728 not-freed blocks
--8421--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8421--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8421--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8421--   Scanning root segment: 0x4037000..0x403efff (32768)
--8421--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8421--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8421--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8421--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8421--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8421--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8421--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8421--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8421--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8421--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8421--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8421--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8421--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8421--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8421--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8421--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8421--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8421--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8421--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8421--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8421--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8421--   Scanning root segment: 0x701a000..0x701afff (4096)
--8421--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8421--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8421--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8421--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8421--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8421--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8421--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8421--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8421== Checked 4,702,224 bytes
==8421== 
==8421== LEAK SUMMARY:
==8421==    definitely lost: 253 bytes in 4 blocks
==8421==    indirectly lost: 6,756 bytes in 7 blocks
==8421==      possibly lost: 0 bytes in 0 blocks
==8421==    still reachable: 3,007,082 bytes in 68,717 blocks
==8421==         suppressed: 0 bytes in 0 blocks
==8421== Rerun with --leak-check=full to see details of leaked memory
==8421== 
==8421== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8421== 
==8421== 1 errors in context 1 of 1:
==8421== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8421==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8421==    by 0x488CD0: stringsubst (subst.c:301)
==8421==    by 0x48801B: prefork (subst.c:77)
==8421==    by 0x42B318: execcmd (exec.c:2619)
==8421==    by 0x428CA0: execpline2 (exec.c:1697)
==8421==    by 0x427FD2: execpline (exec.c:1484)
==8421==    by 0x427756: execlist (exec.c:1267)
==8421==    by 0x42717C: execode (exec.c:1073)
==8421==    by 0x431299: runshfunc (exec.c:5040)
==8421==    by 0x430E76: doshfunc (exec.c:4920)
==8421==    by 0x4302FB: execshfunc (exec.c:4557)
==8421==    by 0x42D8C1: execcmd (exec.c:3373)
==8421== 
==8421== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8423== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8423-by-pythonnut-on-???
==8423== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8423-by-pythonnut-on-???
==8423== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8423-by-pythonnut-on-???
==8423== 
==8423== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8423== don't want to do, unless you know exactly what you're doing,
==8423== or are doing some strange experiment):
==8423==   /usr/lib/valgrind/../../bin/vgdb --pid=8423 ...command...
==8423== 
==8423== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8423==   /path/to/gdb ./zsh
==8423== and then give GDB the following command
==8423==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8423
==8423== --pid is optional if only one valgrind process is running
==8423== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==8424== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8424-by-pythonnut-on-???
==8424== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8424-by-pythonnut-on-???
==8424== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8424-by-pythonnut-on-???
==8424== 
==8424== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8424== don't want to do, unless you know exactly what you're doing,
==8424== or are doing some strange experiment):
==8424==   /usr/lib/valgrind/../../bin/vgdb --pid=8424 ...command...
==8424== 
==8424== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8424==   /path/to/gdb ./zsh
==8424== and then give GDB the following command
==8424==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8424
==8424== --pid is optional if only one valgrind process is running
==8424== 
--8424-- Caught __NR_exit; running __libc_freeres()
--8424-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8424== 
==8424== HEAP SUMMARY:
==8424==     in use at exit: 3,016,186 bytes in 68,807 blocks
==8424==   total heap usage: 834,390 allocs, 765,583 frees, 58,807,135 bytes allocated
==8424== 
==8424== Searching for pointers to 68,807 not-freed blocks
--8424--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8424--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8424--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8424--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8424--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8424--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8424--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8424--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8424--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8424--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8424--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8424--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8424--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8424--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8424--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8424--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8424--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8424--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8424--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8424--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8424--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8424--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8424--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8424--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8424--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8424--   Scanning root segment: 0x701a000..0x701afff (4096)
--8424--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8424--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8424--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8424--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8424--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8424--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8424--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8424--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8424== Checked 4,722,424 bytes
==8424== 
==8424== LEAK SUMMARY:
==8424==    definitely lost: 253 bytes in 4 blocks
==8424==    indirectly lost: 6,756 bytes in 7 blocks
==8424==      possibly lost: 0 bytes in 0 blocks
==8424==    still reachable: 3,009,177 bytes in 68,796 blocks
==8424==         suppressed: 0 bytes in 0 blocks
==8424== Rerun with --leak-check=full to see details of leaked memory
==8424== 
==8424== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8424== 
==8424== 1 errors in context 1 of 1:
==8424== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8424==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8424==    by 0x488CD0: stringsubst (subst.c:301)
==8424==    by 0x48801B: prefork (subst.c:77)
==8424==    by 0x42B318: execcmd (exec.c:2619)
==8424==    by 0x428CA0: execpline2 (exec.c:1697)
==8424==    by 0x427FD2: execpline (exec.c:1484)
==8424==    by 0x427756: execlist (exec.c:1267)
==8424==    by 0x42717C: execode (exec.c:1073)
==8424==    by 0x431299: runshfunc (exec.c:5040)
==8424==    by 0x430E76: doshfunc (exec.c:4920)
==8424==    by 0x4302FB: execshfunc (exec.c:4557)
==8424==    by 0x42D8C1: execcmd (exec.c:3373)
==8424== 
==8424== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8423-- Caught __NR_exit; running __libc_freeres()
--8423-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8423== 
==8423== HEAP SUMMARY:
==8423==     in use at exit: 3,014,086 bytes in 68,728 blocks
==8423==   total heap usage: 834,297 allocs, 765,569 frees, 58,706,739 bytes allocated
==8423== 
==8423== Searching for pointers to 68,728 not-freed blocks
--8423--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8423--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8423--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8423--   Scanning root segment: 0x4037000..0x403efff (32768)
--8423--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8423--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8423--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8423--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8423--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8423--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8423--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8423--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8423--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8423--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8423--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8423--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8423--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8423--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8423--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8423--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8423--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8423--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8423--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8423--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8423--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8423--   Scanning root segment: 0x701a000..0x701afff (4096)
--8423--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8423--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8423--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8423--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8423--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8423--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8423--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8423--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8423== Checked 4,702,224 bytes
==8423== 
==8423== LEAK SUMMARY:
==8423==    definitely lost: 253 bytes in 4 blocks
==8423==    indirectly lost: 6,756 bytes in 7 blocks
==8423==      possibly lost: 0 bytes in 0 blocks
==8423==    still reachable: 3,007,077 bytes in 68,717 blocks
==8423==         suppressed: 0 bytes in 0 blocks
==8423== Rerun with --leak-check=full to see details of leaked memory
==8423== 
==8423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8423== 
==8423== 1 errors in context 1 of 1:
==8423== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8423==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8423==    by 0x488CD0: stringsubst (subst.c:301)
==8423==    by 0x48801B: prefork (subst.c:77)
==8423==    by 0x42B318: execcmd (exec.c:2619)
==8423==    by 0x428CA0: execpline2 (exec.c:1697)
==8423==    by 0x427FD2: execpline (exec.c:1484)
==8423==    by 0x427756: execlist (exec.c:1267)
==8423==    by 0x42717C: execode (exec.c:1073)
==8423==    by 0x431299: runshfunc (exec.c:5040)
==8423==    by 0x430E76: doshfunc (exec.c:4920)
==8423==    by 0x4302FB: execshfunc (exec.c:4557)
==8423==    by 0x42D8C1: execcmd (exec.c:3373)
==8423== 
==8423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8425== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8425-by-pythonnut-on-???
==8425== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8425-by-pythonnut-on-???
==8425== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8425-by-pythonnut-on-???
==8425== 
==8425== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8425== don't want to do, unless you know exactly what you're doing,
==8425== or are doing some strange experiment):
==8425==   /usr/lib/valgrind/../../bin/vgdb --pid=8425 ...command...
==8425== 
==8425== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8425==   /path/to/gdb ./zsh
==8425== and then give GDB the following command
==8425==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8425
==8425== --pid is optional if only one valgrind process is running
==8425== 
==8426== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8426-by-pythonnut-on-???
==8426== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8426-by-pythonnut-on-???
==8426== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8426-by-pythonnut-on-???
==8426== 
==8426== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8426== don't want to do, unless you know exactly what you're doing,
==8426== or are doing some strange experiment):
==8426==   /usr/lib/valgrind/../../bin/vgdb --pid=8426 ...command...
==8426== 
==8426== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8426==   /path/to/gdb ./zsh
==8426== and then give GDB the following command
==8426==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8426
==8426== --pid is optional if only one valgrind process is running
==8426== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--8426-- Caught __NR_exit; running __libc_freeres()
--8426-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8426== 
==8426== HEAP SUMMARY:
==8426==     in use at exit: 3,016,137 bytes in 68,807 blocks
==8426==   total heap usage: 834,401 allocs, 765,594 frees, 58,777,042 bytes allocated
==8426== 
==8426== Searching for pointers to 68,807 not-freed blocks
--8426--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8426--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8426--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8426--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8426--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8426--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8426--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8426--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8426--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8426--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8426--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8426--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8426--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8426--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8426--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8426--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8426--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8426--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8426--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8426--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8426--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8426--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8426--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8426--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8426--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8426--   Scanning root segment: 0x701a000..0x701afff (4096)
--8426--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8426--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8426--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8426--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8426--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8426--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8426--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8426--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8426== Checked 4,722,376 bytes
==8426== 
==8426== LEAK SUMMARY:
==8426==    definitely lost: 253 bytes in 4 blocks
==8426==    indirectly lost: 6,756 bytes in 7 blocks
==8426==      possibly lost: 0 bytes in 0 blocks
==8426==    still reachable: 3,009,128 bytes in 68,796 blocks
==8426==         suppressed: 0 bytes in 0 blocks
==8426== Rerun with --leak-check=full to see details of leaked memory
==8426== 
==8426== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8426== 
==8426== 1 errors in context 1 of 1:
==8426== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8426==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8426==    by 0x488CD0: stringsubst (subst.c:301)
==8426==    by 0x48801B: prefork (subst.c:77)
==8426==    by 0x42B318: execcmd (exec.c:2619)
==8426==    by 0x428CA0: execpline2 (exec.c:1697)
==8426==    by 0x427FD2: execpline (exec.c:1484)
==8426==    by 0x427756: execlist (exec.c:1267)
==8426==    by 0x42717C: execode (exec.c:1073)
==8426==    by 0x431299: runshfunc (exec.c:5040)
==8426==    by 0x430E76: doshfunc (exec.c:4920)
==8426==    by 0x4302FB: execshfunc (exec.c:4557)
==8426==    by 0x42D8C1: execcmd (exec.c:3373)
==8426== 
==8426== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8425-- Caught __NR_exit; running __libc_freeres()
--8425-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8425== 
==8425== HEAP SUMMARY:
==8425==     in use at exit: 3,014,071 bytes in 68,728 blocks
==8425==   total heap usage: 834,308 allocs, 765,580 frees, 58,709,495 bytes allocated
==8425== 
==8425== Searching for pointers to 68,728 not-freed blocks
--8425--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8425--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8425--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8425--   Scanning root segment: 0x4037000..0x403efff (32768)
--8425--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8425--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8425--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8425--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8425--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8425--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8425--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8425--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8425--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8425--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8425--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8425--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8425--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8425--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8425--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8425--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8425--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8425--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8425--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8425--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8425--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8425--   Scanning root segment: 0x701a000..0x701afff (4096)
--8425--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8425--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8425--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8425--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8425--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8425--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8425--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8425--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8425== Checked 4,702,208 bytes
==8425== 
==8425== LEAK SUMMARY:
==8425==    definitely lost: 253 bytes in 4 blocks
==8425==    indirectly lost: 6,756 bytes in 7 blocks
==8425==      possibly lost: 0 bytes in 0 blocks
==8425==    still reachable: 3,007,062 bytes in 68,717 blocks
==8425==         suppressed: 0 bytes in 0 blocks
==8425== Rerun with --leak-check=full to see details of leaked memory
==8425== 
==8425== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8425== 
==8425== 1 errors in context 1 of 1:
==8425== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8425==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8425==    by 0x488CD0: stringsubst (subst.c:301)
==8425==    by 0x48801B: prefork (subst.c:77)
==8425==    by 0x42B318: execcmd (exec.c:2619)
==8425==    by 0x428CA0: execpline2 (exec.c:1697)
==8425==    by 0x427FD2: execpline (exec.c:1484)
==8425==    by 0x427756: execlist (exec.c:1267)
==8425==    by 0x42717C: execode (exec.c:1073)
==8425==    by 0x431299: runshfunc (exec.c:5040)
==8425==    by 0x430E76: doshfunc (exec.c:4920)
==8425==    by 0x4302FB: execshfunc (exec.c:4557)
==8425==    by 0x42D8C1: execcmd (exec.c:3373)
==8425== 
==8425== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8427== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8427-by-pythonnut-on-???
==8427== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8427-by-pythonnut-on-???
==8427== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8427-by-pythonnut-on-???
==8427== 
==8427== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8427== don't want to do, unless you know exactly what you're doing,
==8427== or are doing some strange experiment):
==8427==   /usr/lib/valgrind/../../bin/vgdb --pid=8427 ...command...
==8427== 
==8427== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8427==   /path/to/gdb ./zsh
==8427== and then give GDB the following command
==8427==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8427
==8427== --pid is optional if only one valgrind process is running
==8427== 
==8428== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8428-by-pythonnut-on-???
==8428== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8428-by-pythonnut-on-???
==8428== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8428-by-pythonnut-on-???
==8428== 
==8428== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8428== don't want to do, unless you know exactly what you're doing,
==8428== or are doing some strange experiment):
==8428==   /usr/lib/valgrind/../../bin/vgdb --pid=8428 ...command...
==8428== 
==8428== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8428==   /path/to/gdb ./zsh
==8428== and then give GDB the following command
==8428==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8428
==8428== --pid is optional if only one valgrind process is running
==8428== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--8428-- Caught __NR_exit; running __libc_freeres()
--8428-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8428== 
==8428== HEAP SUMMARY:
==8428==     in use at exit: 3,016,086 bytes in 68,807 blocks
==8428==   total heap usage: 834,412 allocs, 765,605 frees, 58,746,932 bytes allocated
==8428== 
==8428== Searching for pointers to 68,807 not-freed blocks
--8428--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8428--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8428--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8428--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8428--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8428--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8428--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8428--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8428--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8428--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8428--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8428--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8428--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8428--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8428--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8428--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8428--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8428--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8428--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8428--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8428--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8428--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8428--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8428--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8428--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8428--   Scanning root segment: 0x701a000..0x701afff (4096)
--8428--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8428--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8428--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8428--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8428--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8428--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8428--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8428--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8429== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8429-by-pythonnut-on-???
==8429== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8429-by-pythonnut-on-???
==8429== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8429-by-pythonnut-on-???
==8429== 
==8429== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8429== don't want to do, unless you know exactly what you're doing,
==8429== or are doing some strange experiment):
==8429==   /usr/lib/valgrind/../../bin/vgdb --pid=8429 ...command...
==8429== 
==8429== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8429==   /path/to/gdb ./zsh
==8429== and then give GDB the following command
==8429==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8429
==8429== --pid is optional if only one valgrind process is running
==8429== 
==8428== Checked 4,722,328 bytes
==8428== 
--8429-- Caught __NR_exit; running __libc_freeres()
==8428== LEAK SUMMARY:
==8428==    definitely lost: 253 bytes in 4 blocks
==8428==    indirectly lost: 6,756 bytes in 7 blocks
==8428==      possibly lost: 0 bytes in 0 blocks
==8428==    still reachable: 3,009,077 bytes in 68,796 blocks
==8428==         suppressed: 0 bytes in 0 blocks
==8428== Rerun with --leak-check=full to see details of leaked memory
==8428== 
==8428== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8428== 
==8428== 1 errors in context 1 of 1:
==8428== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8428==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8428==    by 0x488CD0: stringsubst (subst.c:301)
==8428==    by 0x48801B: prefork (subst.c:77)
==8428==    by 0x42B318: execcmd (exec.c:2619)
==8428==    by 0x428CA0: execpline2 (exec.c:1697)
==8428==    by 0x427FD2: execpline (exec.c:1484)
==8428==    by 0x427756: execlist (exec.c:1267)
==8428==    by 0x42717C: execode (exec.c:1073)
==8428==    by 0x431299: runshfunc (exec.c:5040)
==8428==    by 0x430E76: doshfunc (exec.c:4920)
==8428==    by 0x4302FB: execshfunc (exec.c:4557)
==8428==    by 0x42D8C1: execcmd (exec.c:3373)
==8428== 
==8428== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8427-- Caught __NR_exit; running __libc_freeres()
--8429-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8429== 
==8429== HEAP SUMMARY:
==8429==     in use at exit: 1,405,227 bytes in 28,934 blocks
==8429==   total heap usage: 787,615 allocs, 758,681 frees, 54,681,487 bytes allocated
==8429== 
--8427-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8429== Searching for pointers to 28,934 not-freed blocks
--8429--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8429--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8429--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8429--   Scanning root segment: 0x4036000..0x4047fff (73728)
--8429--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8429--   Scanning root segment: 0x41d6000..0x421dfff (294912)
==8427== 
--8429--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8429--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8429--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8429--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8429--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8429--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8429--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8429--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8429--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8429--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8429--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8429--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8429--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8429--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8429--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8429--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8429--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8429--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8429--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8429--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8429--   Scanning root segment: 0x701a000..0x701afff (4096)
--8429--   Scanning root segment: 0x881b000..0x8838fff (122880)
--8429--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==8427== HEAP SUMMARY:
==8427==     in use at exit: 3,014,054 bytes in 68,728 blocks
==8427==   total heap usage: 834,319 allocs, 765,591 frees, 58,712,234 bytes allocated
==8427== 
--8429--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8429--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8429--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8429--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8429--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8429--   Scanning root segment: 0xb86b000..0xb874fff (40960)
--8429--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8429== Checked 2,194,920 bytes
==8429== 
==8427== Searching for pointers to 68,728 not-freed blocks
--8427--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8427--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8427--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8427--   Scanning root segment: 0x4037000..0x403efff (32768)
--8427--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8427--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8427--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8427--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8427--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8427--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==8429== LEAK SUMMARY:
==8429==    definitely lost: 253 bytes in 4 blocks
--8427--   Scanning root segment: 0x5041000..0x5041fff (4096)
==8429==    indirectly lost: 6,756 bytes in 7 blocks
==8429==      possibly lost: 0 bytes in 0 blocks
==8429==    still reachable: 1,398,218 bytes in 28,923 blocks
==8429==         suppressed: 0 bytes in 0 blocks
==8429== Rerun with --leak-check=full to see details of leaked memory
==8429== 
--8427--   Scanning root segment: 0x5245000..0x5245fff (4096)
==8429== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8429== 
--8427--   Scanning root segment: 0x54ac000..0x54acfff (4096)
==8429== 1 errors in context 1 of 1:
==8429== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8429==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
--8427--   Scanning root segment: 0x54ad000..0x54adfff (4096)
==8429==    by 0x488CD0: stringsubst (subst.c:301)
==8429==    by 0x48801B: prefork (subst.c:77)
--8427--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
==8429==    by 0x42B318: execcmd (exec.c:2619)
==8429==    by 0x428CA0: execpline2 (exec.c:1697)
==8429==    by 0x427FD2: execpline (exec.c:1484)
--8427--   Scanning root segment: 0x59ba000..0x59bafff (4096)
==8429==    by 0x427756: execlist (exec.c:1267)
==8429==    by 0x42717C: execode (exec.c:1073)
==8429==    by 0x431299: runshfunc (exec.c:5040)
==8429==    by 0x430E76: doshfunc (exec.c:4920)
--8427--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
==8429==    by 0x4302FB: execshfunc (exec.c:4557)
==8429==    by 0x42D8C1: execcmd (exec.c:3373)
==8429== 
==8429== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8427--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8427--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8427--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8427--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8427--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8427--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8427--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8427--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8427--   Scanning root segment: 0x701a000..0x701afff (4096)
--8427--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8427--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8427--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8427--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8427--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8427--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8427--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8427--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8427== Checked 4,702,200 bytes
==8427== 
--8368-- Caught __NR_exit; running __libc_freeres()
==8427== LEAK SUMMARY:
==8427==    definitely lost: 253 bytes in 4 blocks
==8427==    indirectly lost: 6,756 bytes in 7 blocks
==8427==      possibly lost: 0 bytes in 0 blocks
==8427==    still reachable: 3,007,045 bytes in 68,717 blocks
==8427==         suppressed: 0 bytes in 0 blocks
==8427== Rerun with --leak-check=full to see details of leaked memory
==8427== 
==8427== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8427== 
==8427== 1 errors in context 1 of 1:
==8427== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8427==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8427==    by 0x488CD0: stringsubst (subst.c:301)
==8427==    by 0x48801B: prefork (subst.c:77)
==8427==    by 0x42B318: execcmd (exec.c:2619)
==8427==    by 0x428CA0: execpline2 (exec.c:1697)
==8427==    by 0x427FD2: execpline (exec.c:1484)
==8427==    by 0x427756: execlist (exec.c:1267)
==8427==    by 0x42717C: execode (exec.c:1073)
==8427==    by 0x431299: runshfunc (exec.c:5040)
==8427==    by 0x430E76: doshfunc (exec.c:4920)
==8427==    by 0x4302FB: execshfunc (exec.c:4557)
==8427==    by 0x42D8C1: execcmd (exec.c:3373)
==8427== 
==8427== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8368-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8430== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8430-by-pythonnut-on-???
==8430== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8430-by-pythonnut-on-???
==8430== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8430-by-pythonnut-on-???
==8430== 
==8430== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8430== don't want to do, unless you know exactly what you're doing,
==8430== or are doing some strange experiment):
==8430==   /usr/lib/valgrind/../../bin/vgdb --pid=8430 ...command...
==8430== 
==8430== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8430==   /path/to/gdb ./zsh
==8430== and then give GDB the following command
==8430==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8430
==8430== --pid is optional if only one valgrind process is running
==8430== 
==8368== 
==8368== HEAP SUMMARY:
==8368==     in use at exit: 1,367,183 bytes in 28,848 blocks
==8368==   total heap usage: 788,634 allocs, 759,786 frees, 54,712,350 bytes allocated
==8368== 
==8368== Searching for pointers to 28,848 not-freed blocks
--8368--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8368--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8368--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8368--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8368--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8368--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8368--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8368--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8368--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8368--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8368--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8368--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8368--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8368--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8368--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8368--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8368--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8368--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8368--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8368--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8368--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8368--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8368--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8368--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8368--   Scanning root segment: 0x701a000..0x701afff (4096)
--8368--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8368--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8368--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8368--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8368--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8368--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8368--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8431== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8431-by-pythonnut-on-???
==8431== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8431-by-pythonnut-on-???
==8431== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8431-by-pythonnut-on-???
==8431== 
==8431== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8431== don't want to do, unless you know exactly what you're doing,
==8431== or are doing some strange experiment):
==8431==   /usr/lib/valgrind/../../bin/vgdb --pid=8431 ...command...
==8431== 
==8431== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8431==   /path/to/gdb ./zsh
==8431== and then give GDB the following command
==8431==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8431
==8431== --pid is optional if only one valgrind process is running
==8431== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--8431-- Caught __NR_exit; running __libc_freeres()
==8368== Checked 1,622,040 bytes
==8368== 
==8368== LEAK SUMMARY:
==8368==    definitely lost: 253 bytes in 4 blocks
==8368==    indirectly lost: 6,756 bytes in 7 blocks
==8368==      possibly lost: 0 bytes in 0 blocks
==8368==    still reachable: 1,360,174 bytes in 28,837 blocks
==8368==         suppressed: 0 bytes in 0 blocks
==8368== Rerun with --leak-check=full to see details of leaked memory
==8368== 
==8368== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8368== 
==8368== 1 errors in context 1 of 1:
==8368== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8368==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8368==    by 0x488CD0: stringsubst (subst.c:301)
==8368==    by 0x48801B: prefork (subst.c:77)
==8368==    by 0x42B318: execcmd (exec.c:2619)
==8368==    by 0x428CA0: execpline2 (exec.c:1697)
==8368==    by 0x427FD2: execpline (exec.c:1484)
==8368==    by 0x427756: execlist (exec.c:1267)
==8368==    by 0x42717C: execode (exec.c:1073)
==8368==    by 0x431299: runshfunc (exec.c:5040)
==8368==    by 0x430E76: doshfunc (exec.c:4920)
==8368==    by 0x4302FB: execshfunc (exec.c:4557)
==8368==    by 0x42D8C1: execcmd (exec.c:3373)
==8368== 
==8368== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8431-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8348-- Caught __NR_exit; running __libc_freeres()
==8431== 
==8431== HEAP SUMMARY:
==8431==     in use at exit: 3,016,059 bytes in 68,807 blocks
==8431==   total heap usage: 834,423 allocs, 765,616 frees, 58,716,835 bytes allocated
==8431== 
--8348-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8348== 
==8348== HEAP SUMMARY:
==8348==     in use at exit: 1,365,289 bytes in 28,781 blocks
==8348==   total heap usage: 787,456 allocs, 758,675 frees, 54,434,629 bytes allocated
==8348== 
==8431== Searching for pointers to 68,807 not-freed blocks
client request: code 4d430005,  addr 0xFFEFEBCCC,  len 4
--8431--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8431--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8431--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8431--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8431--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8431--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8431--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8431--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8431--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8431--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8431--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8431--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8431--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8431--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8431--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8431--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8431--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8431--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8431--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8431--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8431--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8431--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8431--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8431--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8431--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8431--   Scanning root segment: 0x701a000..0x701afff (4096)
--8431--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8431--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8431--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8431--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8431--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8431--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8431--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8431--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8348== Searching for pointers to 28,781 not-freed blocks
--8348--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8348--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8348--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8348--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8348--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8348--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8348--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8348--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8348--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8348--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8348--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8348--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8348--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8348--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8348--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8348--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8348--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8348--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8348--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8348--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8348--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8348--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8348--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8348--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8348--   Scanning root segment: 0x701a000..0x701afff (4096)
--8348--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8348--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8348--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8348--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8348--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8348--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8348--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8433== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8433-by-pythonnut-on-???
==8433== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8433-by-pythonnut-on-???
==8433== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8433-by-pythonnut-on-???
==8433== 
==8433== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8433== don't want to do, unless you know exactly what you're doing,
==8433== or are doing some strange experiment):
==8433==   /usr/lib/valgrind/../../bin/vgdb --pid=8433 ...command...
==8433== 
==8433== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8433==   /path/to/gdb ./zsh
==8433== and then give GDB the following command
==8433==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8433
==8433== --pid is optional if only one valgrind process is running
==8433== 
==8348== Checked 1,619,736 bytes
==8348== 
==8348== LEAK SUMMARY:
==8348==    definitely lost: 253 bytes in 4 blocks
==8348==    indirectly lost: 6,756 bytes in 7 blocks
==8348==      possibly lost: 0 bytes in 0 blocks
==8348==    still reachable: 1,358,280 bytes in 28,770 blocks
==8348==         suppressed: 0 bytes in 0 blocks
==8348== Rerun with --leak-check=full to see details of leaked memory
==8348== 
==8348== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8348== 
==8348== 1 errors in context 1 of 1:
==8348== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8348==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8348==    by 0x488CD0: stringsubst (subst.c:301)
==8348==    by 0x48801B: prefork (subst.c:77)
==8348==    by 0x42B318: execcmd (exec.c:2619)
==8348==    by 0x428CA0: execpline2 (exec.c:1697)
==8348==    by 0x427FD2: execpline (exec.c:1484)
==8348==    by 0x427756: execlist (exec.c:1267)
==8348==    by 0x42717C: execode (exec.c:1073)
==8348==    by 0x431299: runshfunc (exec.c:5040)
==8348==    by 0x430E76: doshfunc (exec.c:4920)
==8348==    by 0x4302FB: execshfunc (exec.c:4557)
==8348==    by 0x42D8C1: execcmd (exec.c:3373)
==8348== 
==8348== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8434-- Caught __NR_exit; running __libc_freeres()
==8434== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8434-by-pythonnut-on-???
==8434== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8434-by-pythonnut-on-???
==8434== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8434-by-pythonnut-on-???
==8434== 
==8434== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8434== don't want to do, unless you know exactly what you're doing,
==8434== or are doing some strange experiment):
==8434==   /usr/lib/valgrind/../../bin/vgdb --pid=8434 ...command...
==8434== 
==8434== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8434==   /path/to/gdb ./zsh
==8434== and then give GDB the following command
==8434==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8434
==8434== --pid is optional if only one valgrind process is running
==8434== 
client request: code 4d430005,  addr 0xFFEFEC63C,  len 4
--8434-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8434== 
==8434== HEAP SUMMARY:
==8434==     in use at exit: 3,014,251 bytes in 68,610 blocks
==8434==   total heap usage: 831,563 allocs, 762,953 frees, 57,083,130 bytes allocated
==8434== 
==8431== Checked 4,722,288 bytes
==8431== 
==8434== Searching for pointers to 68,610 not-freed blocks
--8434--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8434--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8434--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8434--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8434--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8434--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8434--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8434--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8434--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8434--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8434--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8434--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8434--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8434--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8434--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8434--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8434--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8434--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8434--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8434--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8434--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8434--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8434--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8434--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8434--   Scanning root segment: 0x701a000..0x701afff (4096)
--8434--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8434--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8434--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8434--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8434--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8434--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8434--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8434--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8431== LEAK SUMMARY:
==8431==    definitely lost: 253 bytes in 4 blocks
==8431==    indirectly lost: 6,756 bytes in 7 blocks
==8431==      possibly lost: 0 bytes in 0 blocks
==8431==    still reachable: 3,009,050 bytes in 68,796 blocks
==8431==         suppressed: 0 bytes in 0 blocks
==8431== Rerun with --leak-check=full to see details of leaked memory
==8431== 
==8431== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8431== 
==8431== 1 errors in context 1 of 1:
==8431== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8431==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8431==    by 0x488CD0: stringsubst (subst.c:301)
==8431==    by 0x48801B: prefork (subst.c:77)
==8431==    by 0x42B318: execcmd (exec.c:2619)
==8431==    by 0x428CA0: execpline2 (exec.c:1697)
==8431==    by 0x427FD2: execpline (exec.c:1484)
==8431==    by 0x427756: execlist (exec.c:1267)
==8431==    by 0x42717C: execode (exec.c:1073)
==8431==    by 0x431299: runshfunc (exec.c:5040)
==8431==    by 0x430E76: doshfunc (exec.c:4920)
==8431==    by 0x4302FB: execshfunc (exec.c:4557)
==8431==    by 0x42D8C1: execcmd (exec.c:3373)
==8431== 
==8431== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8430-- Caught __NR_exit; running __libc_freeres()
--8430-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8430== 
==8430== HEAP SUMMARY:
==8430==     in use at exit: 3,014,037 bytes in 68,728 blocks
==8430==   total heap usage: 834,330 allocs, 765,602 frees, 58,714,956 bytes allocated
==8430== 
==8430== Searching for pointers to 68,728 not-freed blocks
--8430--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8430--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8430--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8430--   Scanning root segment: 0x4037000..0x403efff (32768)
--8430--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8430--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8430--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8430--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8430--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8430--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8430--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8430--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8430--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8430--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8430--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8430--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8430--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8430--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8430--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8430--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8430--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8430--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8430--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8430--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8430--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8430--   Scanning root segment: 0x701a000..0x701afff (4096)
--8430--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8430--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8430--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8430--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8430--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8430--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8430--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8430--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8434== Checked 4,660,416 bytes
==8434== 
==8434== LEAK SUMMARY:
==8434==    definitely lost: 253 bytes in 4 blocks
==8434==    indirectly lost: 6,756 bytes in 7 blocks
==8434==      possibly lost: 0 bytes in 0 blocks
==8434==    still reachable: 3,007,242 bytes in 68,599 blocks
==8434==         suppressed: 0 bytes in 0 blocks
==8434== Rerun with --leak-check=full to see details of leaked memory
==8434== 
==8434== Use --track-origins=yes to see where uninitialised values come from
==8434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8434== 
==8434== 1 errors in context 1 of 2:
==8434== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8434==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8434==    by 0x488CD0: stringsubst (subst.c:301)
==8434==    by 0x48801B: prefork (subst.c:77)
==8434==    by 0x42B318: execcmd (exec.c:2619)
==8434==    by 0x428CA0: execpline2 (exec.c:1697)
==8434==    by 0x427FD2: execpline (exec.c:1484)
==8434==    by 0x427756: execlist (exec.c:1267)
==8434==    by 0x42717C: execode (exec.c:1073)
==8434==    by 0x431299: runshfunc (exec.c:5040)
==8434==    by 0x430E76: doshfunc (exec.c:4920)
==8434==    by 0x4302FB: execshfunc (exec.c:4557)
==8434==    by 0x42D8C1: execcmd (exec.c:3373)
==8434== 
==8434== 
==8434== 2 errors in context 2 of 2:
==8434== Conditional jump or move depends on uninitialised value(s)
==8434==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8434==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8434==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8434==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8434==    by 0x42D8E9: execcmd (exec.c:3378)
==8434==    by 0x428CA0: execpline2 (exec.c:1697)
==8434==    by 0x427FD2: execpline (exec.c:1484)
==8434==    by 0x42779A: execlist (exec.c:1275)
==8434==    by 0x42717C: execode (exec.c:1073)
==8434==    by 0x431299: runshfunc (exec.c:5040)
==8434==    by 0x430E76: doshfunc (exec.c:4920)
==8434==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8434== 
==8434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8433-- Caught __NR_exit; running __libc_freeres()
--8433-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8433== 
==8433== HEAP SUMMARY:
==8433==     in use at exit: 3,014,187 bytes in 68,607 blocks
==8433==   total heap usage: 831,561 allocs, 762,954 frees, 57,082,889 bytes allocated
==8433== 
==8430== Checked 4,702,168 bytes
==8430== 
==8433== Searching for pointers to 68,607 not-freed blocks
--8433--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8433--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8433--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8433--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8433--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8433--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8433--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8433--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8433--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8433--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8433--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8433--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8433--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8433--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8433--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8433--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8433--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8433--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8433--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8433--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8433--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8433--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8433--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8433--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8433--   Scanning root segment: 0x701a000..0x701afff (4096)
--8433--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8433--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8433--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8433--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8433--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8433--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8433--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8433--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8430== LEAK SUMMARY:
==8430==    definitely lost: 253 bytes in 4 blocks
==8430==    indirectly lost: 6,756 bytes in 7 blocks
==8430==      possibly lost: 0 bytes in 0 blocks
==8430==    still reachable: 3,007,028 bytes in 68,717 blocks
==8430==         suppressed: 0 bytes in 0 blocks
==8430== Rerun with --leak-check=full to see details of leaked memory
==8430== 
==8430== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8430== 
==8430== 1 errors in context 1 of 1:
==8430== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8430==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8430==    by 0x488CD0: stringsubst (subst.c:301)
==8430==    by 0x48801B: prefork (subst.c:77)
==8430==    by 0x42B318: execcmd (exec.c:2619)
==8430==    by 0x428CA0: execpline2 (exec.c:1697)
==8430==    by 0x427FD2: execpline (exec.c:1484)
==8430==    by 0x427756: execlist (exec.c:1267)
==8430==    by 0x42717C: execode (exec.c:1073)
==8430==    by 0x431299: runshfunc (exec.c:5040)
==8430==    by 0x430E76: doshfunc (exec.c:4920)
==8430==    by 0x4302FB: execshfunc (exec.c:4557)
==8430==    by 0x42D8C1: execcmd (exec.c:3373)
==8430== 
==8430== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF99DC,  len 4
client request: code 4d430005,  addr 0xFFEFF99DC,  len 4
client request: code 4d430005,  addr 0xFFEFF811C,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF817C,  len 4
client request: code 4d430005,  addr 0xFFEFF817C,  len 4
client request: code 4d430005,  addr 0xFFEFF817C,  len 4
client request: code 4d430005,  addr 0xFFEFFB6EC,  len 4
--8415-- Caught __NR_exit; running __libc_freeres()
--8415-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8415== 
==8415== HEAP SUMMARY:
==8415==     in use at exit: 3,010,574 bytes in 68,542 blocks
==8415==   total heap usage: 834,637 allocs, 766,095 frees, 58,767,060 bytes allocated
==8415== 
==8433== Checked 4,659,728 bytes
==8433== 
==8415== Searching for pointers to 68,542 not-freed blocks
--8415--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8415--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8415--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8415--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8415--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8415--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8415--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8415--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8415--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8415--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8415--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8415--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8415--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8415--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8415--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8415--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8415--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
==8433== LEAK SUMMARY:
==8433==    definitely lost: 253 bytes in 4 blocks
==8433==    indirectly lost: 6,756 bytes in 7 blocks
==8433==      possibly lost: 0 bytes in 0 blocks
==8433==    still reachable: 3,007,178 bytes in 68,596 blocks
==8433==         suppressed: 0 bytes in 0 blocks
==8433== Rerun with --leak-check=full to see details of leaked memory
==8433== 
==8433== Use --track-origins=yes to see where uninitialised values come from
==8433== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8433== 
==8433== 1 errors in context 1 of 2:
==8433== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--8415--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
==8433==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8433==    by 0x488CD0: stringsubst (subst.c:301)
==8433==    by 0x48801B: prefork (subst.c:77)
==8433==    by 0x42B318: execcmd (exec.c:2619)
--8415--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
==8433==    by 0x428CA0: execpline2 (exec.c:1697)
==8433==    by 0x427FD2: execpline (exec.c:1484)
==8433==    by 0x427756: execlist (exec.c:1267)
==8433==    by 0x42717C: execode (exec.c:1073)
==8433==    by 0x431299: runshfunc (exec.c:5040)
==8433==    by 0x430E76: doshfunc (exec.c:4920)
==8433==    by 0x4302FB: execshfunc (exec.c:4557)
==8433==    by 0x42D8C1: execcmd (exec.c:3373)
==8433== 
==8433== 
==8433== 2 errors in context 2 of 2:
==8433== Conditional jump or move depends on uninitialised value(s)
==8433==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8433==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8433==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8433==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8433==    by 0x42D8E9: execcmd (exec.c:3378)
--8415--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==8433==    by 0x428CA0: execpline2 (exec.c:1697)
==8433==    by 0x427FD2: execpline (exec.c:1484)
==8433==    by 0x42779A: execlist (exec.c:1275)
==8433==    by 0x42717C: execode (exec.c:1073)
==8433==    by 0x431299: runshfunc (exec.c:5040)
==8433==    by 0x430E76: doshfunc (exec.c:4920)
==8433==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8433== 
==8433== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8415--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8415--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8415--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8415--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8415--   Scanning root segment: 0x701a000..0x701afff (4096)
--8415--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8415--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8415--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8415--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8415--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8415--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8415--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8415--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8438-- Caught __NR_exit; running __libc_freeres()
==8438== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8438-by-pythonnut-on-???
==8438== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8438-by-pythonnut-on-???
==8438== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8438-by-pythonnut-on-???
==8438== 
==8438== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8438== don't want to do, unless you know exactly what you're doing,
==8438== or are doing some strange experiment):
==8438==   /usr/lib/valgrind/../../bin/vgdb --pid=8438 ...command...
==8438== 
==8438== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8438==   /path/to/gdb ./zsh
==8438== and then give GDB the following command
==8438==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8438
==8438== --pid is optional if only one valgrind process is running
==8438== 
--8438-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8438== 
==8438== HEAP SUMMARY:
==8438==     in use at exit: 3,014,194 bytes in 68,607 blocks
==8438==   total heap usage: 831,576 allocs, 762,969 frees, 57,087,887 bytes allocated
==8438== 
==8438== Searching for pointers to 68,607 not-freed blocks
--8438--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8438--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8438--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8438--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8438--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8438--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8438--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8438--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8438--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8438--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8438--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8438--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8438--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8438--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8438--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8438--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8438--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8438--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8438--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8438--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8438--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8438--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8438--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8438--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8438--   Scanning root segment: 0x701a000..0x701afff (4096)
--8438--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8438--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8438--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8438--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8438--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8438--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8438--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8438--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8415== Checked 4,659,160 bytes
==8415== 
==8415== LEAK SUMMARY:
==8415==    definitely lost: 253 bytes in 4 blocks
==8415==    indirectly lost: 6,756 bytes in 7 blocks
==8415==      possibly lost: 0 bytes in 0 blocks
==8415==    still reachable: 3,003,565 bytes in 68,531 blocks
==8415==         suppressed: 0 bytes in 0 blocks
==8415== Rerun with --leak-check=full to see details of leaked memory
==8415== 
==8415== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8415== 
==8415== 1 errors in context 1 of 1:
==8415== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8415==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8415==    by 0x488CD0: stringsubst (subst.c:301)
==8415==    by 0x48801B: prefork (subst.c:77)
==8415==    by 0x42B318: execcmd (exec.c:2619)
==8415==    by 0x428CA0: execpline2 (exec.c:1697)
==8415==    by 0x427FD2: execpline (exec.c:1484)
==8415==    by 0x427756: execlist (exec.c:1267)
==8415==    by 0x42717C: execode (exec.c:1073)
==8415==    by 0x431299: runshfunc (exec.c:5040)
==8415==    by 0x430E76: doshfunc (exec.c:4920)
==8415==    by 0x4302FB: execshfunc (exec.c:4557)
==8415==    by 0x42D8C1: execcmd (exec.c:3373)
==8415== 
==8415== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8412-- Caught __NR_exit; running __libc_freeres()
--8412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8412== 
==8412== HEAP SUMMARY:
==8412==     in use at exit: 2,983,799 bytes in 68,292 blocks
==8412==   total heap usage: 830,622 allocs, 762,330 frees, 57,169,523 bytes allocated
==8412== 
==8412== Searching for pointers to 68,292 not-freed blocks
--8412--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8412--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8412--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8412--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8412--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8412--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8412--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8412--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8412--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8412--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8412--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8412--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8412--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8412--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8412--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8412--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8412--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8412--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8412--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8412--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8412--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8412--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8412--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8412--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8412--   Scanning root segment: 0x701a000..0x701afff (4096)
--8412--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8412--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8412--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8412--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8412--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8412--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8412--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8412--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8438== Checked 4,659,864 bytes
==8438== 
==8438== LEAK SUMMARY:
==8438==    definitely lost: 253 bytes in 4 blocks
==8438==    indirectly lost: 6,756 bytes in 7 blocks
==8438==      possibly lost: 0 bytes in 0 blocks
==8438==    still reachable: 3,007,185 bytes in 68,596 blocks
==8438==         suppressed: 0 bytes in 0 blocks
==8438== Rerun with --leak-check=full to see details of leaked memory
==8438== 
==8438== Use --track-origins=yes to see where uninitialised values come from
==8438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8438== 
==8438== 1 errors in context 1 of 2:
==8438== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8438==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8438==    by 0x488CD0: stringsubst (subst.c:301)
==8438==    by 0x48801B: prefork (subst.c:77)
==8438==    by 0x42B318: execcmd (exec.c:2619)
==8438==    by 0x428CA0: execpline2 (exec.c:1697)
==8438==    by 0x427FD2: execpline (exec.c:1484)
==8438==    by 0x427756: execlist (exec.c:1267)
==8438==    by 0x42717C: execode (exec.c:1073)
==8438==    by 0x431299: runshfunc (exec.c:5040)
==8438==    by 0x430E76: doshfunc (exec.c:4920)
==8438==    by 0x4302FB: execshfunc (exec.c:4557)
==8438==    by 0x42D8C1: execcmd (exec.c:3373)
==8438== 
==8438== 
==8438== 2 errors in context 2 of 2:
==8438== Conditional jump or move depends on uninitialised value(s)
==8438==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8438==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8438==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8438==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8438==    by 0x42D8E9: execcmd (exec.c:3378)
==8438==    by 0x428CA0: execpline2 (exec.c:1697)
==8438==    by 0x427FD2: execpline (exec.c:1484)
==8438==    by 0x42779A: execlist (exec.c:1275)
==8438==    by 0x42717C: execode (exec.c:1073)
==8438==    by 0x431299: runshfunc (exec.c:5040)
==8438==    by 0x430E76: doshfunc (exec.c:4920)
==8438==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8438== 
==8438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8458-- Caught __NR_exit; running __libc_freeres()
==8458== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8458-by-pythonnut-on-???
==8458== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8458-by-pythonnut-on-???
==8458== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8458-by-pythonnut-on-???
==8458== 
==8458== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8458== don't want to do, unless you know exactly what you're doing,
==8458== or are doing some strange experiment):
==8458==   /usr/lib/valgrind/../../bin/vgdb --pid=8458 ...command...
==8458== 
==8458== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8458==   /path/to/gdb ./zsh
==8458== and then give GDB the following command
==8458==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8458
==8458== --pid is optional if only one valgrind process is running
==8458== 
--8458-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8458== 
==8458== HEAP SUMMARY:
==8458==     in use at exit: 3,014,290 bytes in 68,607 blocks
==8458==   total heap usage: 831,592 allocs, 762,985 frees, 57,092,674 bytes allocated
==8458== 
==8412== Checked 4,631,152 bytes
==8412== 
==8412== LEAK SUMMARY:
==8412==    definitely lost: 253 bytes in 4 blocks
==8412==    indirectly lost: 6,756 bytes in 7 blocks
==8412==      possibly lost: 0 bytes in 0 blocks
==8412==    still reachable: 2,976,790 bytes in 68,281 blocks
==8412==         suppressed: 0 bytes in 0 blocks
==8412== Rerun with --leak-check=full to see details of leaked memory
==8412== 
==8412== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8412== 
==8412== 1 errors in context 1 of 1:
==8412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8412==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8412==    by 0x488CD0: stringsubst (subst.c:301)
==8412==    by 0x48801B: prefork (subst.c:77)
==8412==    by 0x42B318: execcmd (exec.c:2619)
==8412==    by 0x428CA0: execpline2 (exec.c:1697)
==8412==    by 0x427FD2: execpline (exec.c:1484)
==8412==    by 0x427756: execlist (exec.c:1267)
==8412==    by 0x42717C: execode (exec.c:1073)
==8412==    by 0x431299: runshfunc (exec.c:5040)
==8412==    by 0x430E76: doshfunc (exec.c:4920)
==8412==    by 0x4302FB: execshfunc (exec.c:4557)
==8458== Searching for pointers to 68,607 not-freed blocks
==8412==    by 0x42D8C1: execcmd (exec.c:3373)
==8412== 
--8458--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8412== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8458--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8458--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8458--   Scanning root segment: 0x4037000..0x403afff (16384)
--8458--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8458--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8458--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8458--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8458--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8458--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8458--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8458--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8458--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8458--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8458--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8458--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8458--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8458--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8458--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8458--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8458--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8458--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8458--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8458--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8458--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8458--   Scanning root segment: 0x701a000..0x701afff (4096)
--8458--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8458--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8458--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8458--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8458--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8458--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8458--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8458--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
--8358-- Caught __NR_exit; running __libc_freeres()
--8358-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8358== 
==8358== HEAP SUMMARY:
==8358==     in use at exit: 2,983,200 bytes in 68,279 blocks
==8358==   total heap usage: 830,662 allocs, 762,383 frees, 57,164,906 bytes allocated
==8358== 
==8358== Searching for pointers to 68,279 not-freed blocks
--8358--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8358--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8358--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8358--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8358--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8358--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8358--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8358--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8358--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8358--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8358--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8358--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8358--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8358--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8358--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8358--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8358--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8358--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8358--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8358--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8358--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8358--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8358--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8358--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8358--   Scanning root segment: 0x701a000..0x701afff (4096)
--8358--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8358--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8358--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8358--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8358--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8358--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8358--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8358--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8458== Checked 4,675,528 bytes
==8458== 
==8458== LEAK SUMMARY:
==8458==    definitely lost: 253 bytes in 4 blocks
==8458==    indirectly lost: 6,756 bytes in 7 blocks
==8458==      possibly lost: 0 bytes in 0 blocks
==8458==    still reachable: 3,007,281 bytes in 68,596 blocks
==8458==         suppressed: 0 bytes in 0 blocks
==8458== Rerun with --leak-check=full to see details of leaked memory
==8458== 
==8458== Use --track-origins=yes to see where uninitialised values come from
==8458== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8458== 
==8458== 1 errors in context 1 of 2:
==8458== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8458==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8458==    by 0x488CD0: stringsubst (subst.c:301)
==8458==    by 0x48801B: prefork (subst.c:77)
==8458==    by 0x42B318: execcmd (exec.c:2619)
==8458==    by 0x428CA0: execpline2 (exec.c:1697)
==8458==    by 0x427FD2: execpline (exec.c:1484)
==8458==    by 0x427756: execlist (exec.c:1267)
==8458==    by 0x42717C: execode (exec.c:1073)
==8458==    by 0x431299: runshfunc (exec.c:5040)
==8458==    by 0x430E76: doshfunc (exec.c:4920)
==8458==    by 0x4302FB: execshfunc (exec.c:4557)
==8458==    by 0x42D8C1: execcmd (exec.c:3373)
==8458== 
==8458== 
==8458== 2 errors in context 2 of 2:
==8458== Conditional jump or move depends on uninitialised value(s)
==8458==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8458==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8458==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8458==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8458==    by 0x42D8E9: execcmd (exec.c:3378)
==8458==    by 0x428CA0: execpline2 (exec.c:1697)
==8458==    by 0x427FD2: execpline (exec.c:1484)
==8458==    by 0x42779A: execlist (exec.c:1275)
==8458==    by 0x42717C: execode (exec.c:1073)
==8458==    by 0x431299: runshfunc (exec.c:5040)
==8458==    by 0x430E76: doshfunc (exec.c:4920)
==8458==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8458== 
==8458== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEA45C,  len 4
==8358== Checked 4,629,880 bytes
==8358== 
==8563== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8563-by-pythonnut-on-???
==8563== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8563-by-pythonnut-on-???
==8563== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8563-by-pythonnut-on-???
==8563== 
==8563== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8563== don't want to do, unless you know exactly what you're doing,
==8563== or are doing some strange experiment):
==8563==   /usr/lib/valgrind/../../bin/vgdb --pid=8563 ...command...
==8563== 
==8563== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8563==   /path/to/gdb ./zsh
==8563== and then give GDB the following command
==8563==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8563
==8563== --pid is optional if only one valgrind process is running
==8563== 
--8563-- Caught __NR_exit; running __libc_freeres()
==8358== LEAK SUMMARY:
==8358==    definitely lost: 253 bytes in 4 blocks
==8358==    indirectly lost: 6,756 bytes in 7 blocks
==8358==      possibly lost: 0 bytes in 0 blocks
==8358==    still reachable: 2,976,191 bytes in 68,268 blocks
==8358==         suppressed: 0 bytes in 0 blocks
==8358== Rerun with --leak-check=full to see details of leaked memory
==8358== 
==8358== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8358== 
==8358== 1 errors in context 1 of 1:
==8358== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8358==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8358==    by 0x488CD0: stringsubst (subst.c:301)
==8358==    by 0x48801B: prefork (subst.c:77)
==8358==    by 0x42B318: execcmd (exec.c:2619)
==8358==    by 0x428CA0: execpline2 (exec.c:1697)
==8358==    by 0x427FD2: execpline (exec.c:1484)
==8358==    by 0x427756: execlist (exec.c:1267)
==8358==    by 0x42717C: execode (exec.c:1073)
==8358==    by 0x431299: runshfunc (exec.c:5040)
==8358==    by 0x430E76: doshfunc (exec.c:4920)
==8358==    by 0x4302FB: execshfunc (exec.c:4557)
==8358==    by 0x42D8C1: execcmd (exec.c:3373)
==8358== 
==8358== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8564== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8564-by-pythonnut-on-???
==8564== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8564-by-pythonnut-on-???
==8564== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8564-by-pythonnut-on-???
==8564== 
==8564== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8564== don't want to do, unless you know exactly what you're doing,
==8564== or are doing some strange experiment):
==8564==   /usr/lib/valgrind/../../bin/vgdb --pid=8564 ...command...
==8564== 
==8564== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8564==   /path/to/gdb ./zsh
==8564== and then give GDB the following command
==8564==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8564
==8564== --pid is optional if only one valgrind process is running
==8564== 
--8563-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8563== 
==8563== HEAP SUMMARY:
==8563==     in use at exit: 3,018,391 bytes in 68,693 blocks
==8563==   total heap usage: 832,015 allocs, 763,322 frees, 57,327,847 bytes allocated
==8563== 
--8564-- Caught __NR_exit; running __libc_freeres()
==8563== Searching for pointers to 68,693 not-freed blocks
--8563--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8563--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8563--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8563--   Scanning root segment: 0x4037000..0x403afff (16384)
--8563--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8563--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8563--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8563--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8563--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8563--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8563--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8563--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8563--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8563--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8563--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8563--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8563--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8563--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8563--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8563--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8563--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8563--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8563--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8563--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8563--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8563--   Scanning root segment: 0x701a000..0x701afff (4096)
--8563--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8563--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8563--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8563--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8563--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8563--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8563--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8563--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8564-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8564== 
==8564== HEAP SUMMARY:
==8564==     in use at exit: 3,015,182 bytes in 68,630 blocks
==8564==   total heap usage: 832,162 allocs, 763,532 frees, 57,344,270 bytes allocated
==8564== 
==8564== Searching for pointers to 68,630 not-freed blocks
--8564--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8564--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8564--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8564--   Scanning root segment: 0x4037000..0x403afff (16384)
--8564--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8564--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8564--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8564--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8564--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8564--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8564--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8564--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8564--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8564--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8564--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8564--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8564--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8564--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8564--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8564--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8564--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8564--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8564--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8564--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8564--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8564--   Scanning root segment: 0x701a000..0x701afff (4096)
--8564--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8564--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8564--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8564--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8564--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8564--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8564--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8564--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8563== Checked 4,680,888 bytes
==8563== 
==8563== LEAK SUMMARY:
==8563==    definitely lost: 253 bytes in 4 blocks
==8563==    indirectly lost: 6,756 bytes in 7 blocks
==8563==      possibly lost: 0 bytes in 0 blocks
==8563==    still reachable: 3,011,382 bytes in 68,682 blocks
==8563==         suppressed: 0 bytes in 0 blocks
==8563== Rerun with --leak-check=full to see details of leaked memory
==8563== 
==8563== Use --track-origins=yes to see where uninitialised values come from
==8563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8563== 
==8563== 1 errors in context 1 of 2:
==8563== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8563==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8563==    by 0x488CD0: stringsubst (subst.c:301)
==8563==    by 0x48801B: prefork (subst.c:77)
==8563==    by 0x42B318: execcmd (exec.c:2619)
==8563==    by 0x428CA0: execpline2 (exec.c:1697)
==8563==    by 0x427FD2: execpline (exec.c:1484)
==8563==    by 0x427756: execlist (exec.c:1267)
==8563==    by 0x42717C: execode (exec.c:1073)
==8563==    by 0x431299: runshfunc (exec.c:5040)
==8563==    by 0x430E76: doshfunc (exec.c:4920)
==8563==    by 0x4302FB: execshfunc (exec.c:4557)
==8563==    by 0x42D8C1: execcmd (exec.c:3373)
==8563== 
==8563== 
==8563== 2 errors in context 2 of 2:
==8563== Conditional jump or move depends on uninitialised value(s)
==8563==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8563==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8563==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8563==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8563==    by 0x42D8E9: execcmd (exec.c:3378)
==8563==    by 0x428CA0: execpline2 (exec.c:1697)
==8563==    by 0x427FD2: execpline (exec.c:1484)
==8563==    by 0x42779A: execlist (exec.c:1275)
==8563==    by 0x42717C: execode (exec.c:1073)
==8563==    by 0x431299: runshfunc (exec.c:5040)
==8563==    by 0x430E76: doshfunc (exec.c:4920)
==8563==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8563== 
==8563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8564== Checked 4,676,336 bytes
==8564== 
==8564== LEAK SUMMARY:
==8564==    definitely lost: 253 bytes in 4 blocks
==8564==    indirectly lost: 6,756 bytes in 7 blocks
==8564==      possibly lost: 0 bytes in 0 blocks
==8564==    still reachable: 3,008,173 bytes in 68,619 blocks
==8564==         suppressed: 0 bytes in 0 blocks
==8564== Rerun with --leak-check=full to see details of leaked memory
==8564== 
==8564== Use --track-origins=yes to see where uninitialised values come from
==8564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8564== 
==8564== 1 errors in context 1 of 2:
==8564== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8564==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8564==    by 0x488CD0: stringsubst (subst.c:301)
==8564==    by 0x48801B: prefork (subst.c:77)
==8564==    by 0x42B318: execcmd (exec.c:2619)
==8564==    by 0x428CA0: execpline2 (exec.c:1697)
==8564==    by 0x427FD2: execpline (exec.c:1484)
==8564==    by 0x427756: execlist (exec.c:1267)
==8564==    by 0x42717C: execode (exec.c:1073)
==8564==    by 0x431299: runshfunc (exec.c:5040)
==8564==    by 0x430E76: doshfunc (exec.c:4920)
==8564==    by 0x4302FB: execshfunc (exec.c:4557)
==8564==    by 0x42D8C1: execcmd (exec.c:3373)
==8564== 
==8564== 
==8564== 2 errors in context 2 of 2:
==8564== Conditional jump or move depends on uninitialised value(s)
==8564==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8564==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8564==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8564==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8564==    by 0x42D8E9: execcmd (exec.c:3378)
==8564==    by 0x428CA0: execpline2 (exec.c:1697)
==8564==    by 0x427FD2: execpline (exec.c:1484)
==8564==    by 0x42779A: execlist (exec.c:1275)
==8564==    by 0x42717C: execode (exec.c:1073)
==8564==    by 0x431299: runshfunc (exec.c:5040)
==8564==    by 0x430E76: doshfunc (exec.c:4920)
==8564==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8564== 
==8564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8638-- Caught __NR_exit; running __libc_freeres()
==8638== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8638-by-pythonnut-on-???
==8638== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8638-by-pythonnut-on-???
==8638== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8638-by-pythonnut-on-???
==8638== 
==8638== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8638== don't want to do, unless you know exactly what you're doing,
==8638== or are doing some strange experiment):
==8638==   /usr/lib/valgrind/../../bin/vgdb --pid=8638 ...command...
==8638== 
==8638== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8638==   /path/to/gdb ./zsh
==8638== and then give GDB the following command
==8638==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8638
==8638== --pid is optional if only one valgrind process is running
==8638== 
--8638-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8638== 
==8638== HEAP SUMMARY:
==8638==     in use at exit: 3,015,118 bytes in 68,630 blocks
==8638==   total heap usage: 832,142 allocs, 763,512 frees, 57,342,040 bytes allocated
==8638== 
==8638== Searching for pointers to 68,630 not-freed blocks
--8638--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8638--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8638--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8638--   Scanning root segment: 0x4037000..0x403afff (16384)
--8638--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8638--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8638--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8638--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8638--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8638--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8638--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8638--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8638--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8638--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8638--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8638--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8638--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8638--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8638--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8638--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8638--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8638--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8638--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8638--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8638--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8638--   Scanning root segment: 0x701a000..0x701afff (4096)
--8638--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8638--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8638--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8638--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8638--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8638--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8638--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8638--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8638== Checked 4,676,256 bytes
==8638== 
==8638== LEAK SUMMARY:
==8638==    definitely lost: 253 bytes in 4 blocks
==8638==    indirectly lost: 6,756 bytes in 7 blocks
==8638==      possibly lost: 0 bytes in 0 blocks
==8638==    still reachable: 3,008,109 bytes in 68,619 blocks
==8638==         suppressed: 0 bytes in 0 blocks
==8638== Rerun with --leak-check=full to see details of leaked memory
==8638== 
==8638== Use --track-origins=yes to see where uninitialised values come from
==8638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8638== 
==8638== 1 errors in context 1 of 2:
==8638== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8638==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8638==    by 0x488CD0: stringsubst (subst.c:301)
==8638==    by 0x48801B: prefork (subst.c:77)
==8638==    by 0x42B318: execcmd (exec.c:2619)
==8638==    by 0x428CA0: execpline2 (exec.c:1697)
==8638==    by 0x427FD2: execpline (exec.c:1484)
==8638==    by 0x427756: execlist (exec.c:1267)
==8638==    by 0x42717C: execode (exec.c:1073)
==8638==    by 0x431299: runshfunc (exec.c:5040)
==8638==    by 0x430E76: doshfunc (exec.c:4920)
==8638==    by 0x4302FB: execshfunc (exec.c:4557)
==8638==    by 0x42D8C1: execcmd (exec.c:3373)
==8638== 
==8638== 
==8638== 2 errors in context 2 of 2:
==8638== Conditional jump or move depends on uninitialised value(s)
==8638==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8638==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8638==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8638==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8638==    by 0x42D8E9: execcmd (exec.c:3378)
==8638==    by 0x428CA0: execpline2 (exec.c:1697)
==8638==    by 0x427FD2: execpline (exec.c:1484)
==8638==    by 0x42779A: execlist (exec.c:1275)
==8638==    by 0x42717C: execode (exec.c:1073)
==8638==    by 0x431299: runshfunc (exec.c:5040)
==8638==    by 0x430E76: doshfunc (exec.c:4920)
==8638==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8638== 
==8638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8697== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8697-by-pythonnut-on-???
==8697== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8697-by-pythonnut-on-???
==8697== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8697-by-pythonnut-on-???
==8697== 
==8697== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8697== don't want to do, unless you know exactly what you're doing,
==8697== or are doing some strange experiment):
==8697==   /usr/lib/valgrind/../../bin/vgdb --pid=8697 ...command...
==8697== 
==8697== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8697==   /path/to/gdb ./zsh
==8697== and then give GDB the following command
==8697==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8697
==8697== --pid is optional if only one valgrind process is running
==8697== 
--8697-- Caught __NR_exit; running __libc_freeres()
--8697-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8697== 
==8697== HEAP SUMMARY:
==8697==     in use at exit: 3,015,148 bytes in 68,631 blocks
==8697==   total heap usage: 832,155 allocs, 763,524 frees, 57,344,729 bytes allocated
==8697== 
==8697== Searching for pointers to 68,631 not-freed blocks
--8697--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8697--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8697--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8697--   Scanning root segment: 0x4037000..0x403afff (16384)
--8697--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8697--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8697--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8697--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8697--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8697--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8697--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8697--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8697--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8697--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8697--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8697--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8697--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8697--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8697--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8697--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8697--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8697--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8697--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8697--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8697--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8697--   Scanning root segment: 0x701a000..0x701afff (4096)
--8697--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8697--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8697--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8697--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8697--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8697--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8697--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8697--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8697== Checked 4,675,768 bytes
==8697== 
==8697== LEAK SUMMARY:
==8697==    definitely lost: 253 bytes in 4 blocks
==8697==    indirectly lost: 6,756 bytes in 7 blocks
==8697==      possibly lost: 0 bytes in 0 blocks
==8697==    still reachable: 3,008,139 bytes in 68,620 blocks
==8697==         suppressed: 0 bytes in 0 blocks
==8697== Rerun with --leak-check=full to see details of leaked memory
==8697== 
==8697== Use --track-origins=yes to see where uninitialised values come from
==8697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8697== 
==8697== 1 errors in context 1 of 2:
==8697== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8697==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8697==    by 0x488CD0: stringsubst (subst.c:301)
==8697==    by 0x48801B: prefork (subst.c:77)
==8697==    by 0x42B318: execcmd (exec.c:2619)
==8697==    by 0x428CA0: execpline2 (exec.c:1697)
==8697==    by 0x427FD2: execpline (exec.c:1484)
==8697==    by 0x427756: execlist (exec.c:1267)
==8697==    by 0x42717C: execode (exec.c:1073)
==8697==    by 0x431299: runshfunc (exec.c:5040)
==8697==    by 0x430E76: doshfunc (exec.c:4920)
==8697==    by 0x4302FB: execshfunc (exec.c:4557)
==8697==    by 0x42D8C1: execcmd (exec.c:3373)
==8697== 
==8697== 
==8697== 2 errors in context 2 of 2:
==8697== Conditional jump or move depends on uninitialised value(s)
==8697==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8697==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8697==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8697==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8697==    by 0x42D8E9: execcmd (exec.c:3378)
==8697==    by 0x428CA0: execpline2 (exec.c:1697)
==8697==    by 0x427FD2: execpline (exec.c:1484)
==8697==    by 0x42779A: execlist (exec.c:1275)
==8697==    by 0x42717C: execode (exec.c:1073)
==8697==    by 0x431299: runshfunc (exec.c:5040)
==8697==    by 0x430E76: doshfunc (exec.c:4920)
==8697==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8697== 
==8697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8698-- Caught __NR_exit; running __libc_freeres()
==8698== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8698-by-pythonnut-on-???
==8698== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8698-by-pythonnut-on-???
==8698== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8698-by-pythonnut-on-???
==8698== 
==8698== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8698== don't want to do, unless you know exactly what you're doing,
==8698== or are doing some strange experiment):
==8698==   /usr/lib/valgrind/../../bin/vgdb --pid=8698 ...command...
==8698== 
==8698== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8698==   /path/to/gdb ./zsh
==8698== and then give GDB the following command
==8698==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8698
==8698== --pid is optional if only one valgrind process is running
==8698== 
--8698-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8698== 
==8698== HEAP SUMMARY:
==8698==     in use at exit: 3,014,858 bytes in 68,622 blocks
==8698==   total heap usage: 832,337 allocs, 763,715 frees, 57,364,228 bytes allocated
==8698== 
==8698== Searching for pointers to 68,622 not-freed blocks
--8698--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8698--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8698--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8698--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8698--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8698--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8698--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8698--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8698--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8698--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8698--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8698--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8698--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8698--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8698--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8698--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8698--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8698--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8698--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8698--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8698--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8698--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8698--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8698--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8698--   Scanning root segment: 0x701a000..0x701afff (4096)
--8698--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8698--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8698--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8698--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8698--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8698--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8698--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8698--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8698== Checked 4,659,864 bytes
==8698== 
==8698== LEAK SUMMARY:
==8698==    definitely lost: 253 bytes in 4 blocks
==8698==    indirectly lost: 6,756 bytes in 7 blocks
==8698==      possibly lost: 0 bytes in 0 blocks
==8698==    still reachable: 3,007,849 bytes in 68,611 blocks
==8698==         suppressed: 0 bytes in 0 blocks
==8698== Rerun with --leak-check=full to see details of leaked memory
==8698== 
==8698== Use --track-origins=yes to see where uninitialised values come from
==8698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8698== 
==8698== 1 errors in context 1 of 2:
==8698== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8698==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8698==    by 0x488CD0: stringsubst (subst.c:301)
==8698==    by 0x48801B: prefork (subst.c:77)
==8698==    by 0x42B318: execcmd (exec.c:2619)
==8698==    by 0x428CA0: execpline2 (exec.c:1697)
==8698==    by 0x427FD2: execpline (exec.c:1484)
==8698==    by 0x427756: execlist (exec.c:1267)
==8698==    by 0x42717C: execode (exec.c:1073)
==8698==    by 0x431299: runshfunc (exec.c:5040)
==8698==    by 0x430E76: doshfunc (exec.c:4920)
==8698==    by 0x4302FB: execshfunc (exec.c:4557)
==8698==    by 0x42D8C1: execcmd (exec.c:3373)
==8698== 
==8698== 
==8698== 2 errors in context 2 of 2:
==8698== Conditional jump or move depends on uninitialised value(s)
==8698==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8698==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8698==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8698==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8698==    by 0x42D8E9: execcmd (exec.c:3378)
==8698==    by 0x428CA0: execpline2 (exec.c:1697)
==8698==    by 0x427FD2: execpline (exec.c:1484)
==8698==    by 0x42779A: execlist (exec.c:1275)
==8698==    by 0x42717C: execode (exec.c:1073)
==8698==    by 0x431299: runshfunc (exec.c:5040)
==8698==    by 0x430E76: doshfunc (exec.c:4920)
==8698==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8698== 
==8698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/computil.so
--7806--    svma 0x00000026c0, avma 0x000ba726c0
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d790 strncpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
==9244== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9244-by-pythonnut-on-???
==9244== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9244-by-pythonnut-on-???
==9244== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9244-by-pythonnut-on-???
==9244== 
==9244== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9244== don't want to do, unless you know exactly what you're doing,
==9244== or are doing some strange experiment):
==9244==   /usr/lib/valgrind/../../bin/vgdb --pid=9244 ...command...
==9244== 
==9244== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9244==   /path/to/gdb ./zsh
==9244== and then give GDB the following command
==9244==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9244
==9244== --pid is optional if only one valgrind process is running
==9244== 
--9244-- Caught __NR_exit; running __libc_freeres()
--9244-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9244== 
==9244== HEAP SUMMARY:
==9244==     in use at exit: 3,144,593 bytes in 69,587 blocks
==9244==   total heap usage: 924,938 allocs, 855,351 frees, 65,162,922 bytes allocated
==9244== 
==9244== Searching for pointers to 69,587 not-freed blocks
--9244--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9244--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9244--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9244--   Scanning root segment: 0x4037000..0x403afff (16384)
--9244--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9244--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9244--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9244--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9244--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9244--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9244--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9244--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9244--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9244--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9244--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9244--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9244--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9244--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9244--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9244--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9244--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9244--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9244--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9244--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9244--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9244--   Scanning root segment: 0x701a000..0x701afff (4096)
--9244--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9244--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9244--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9244--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9244--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9244--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9244--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9244--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9244--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9244== Checked 4,820,928 bytes
==9244== 
==9244== LEAK SUMMARY:
==9244==    definitely lost: 1,533 bytes in 8 blocks
==9244==    indirectly lost: 6,756 bytes in 7 blocks
==9244==      possibly lost: 0 bytes in 0 blocks
==9244==    still reachable: 3,136,304 bytes in 69,572 blocks
==9244==         suppressed: 0 bytes in 0 blocks
==9244== Rerun with --leak-check=full to see details of leaked memory
==9244== 
==9244== Use --track-origins=yes to see where uninitialised values come from
==9244== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9244== 
==9244== 1 errors in context 1 of 2:
==9244== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9244==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9244==    by 0x488CD0: stringsubst (subst.c:301)
==9244==    by 0x48801B: prefork (subst.c:77)
==9244==    by 0x42B318: execcmd (exec.c:2619)
==9244==    by 0x428CA0: execpline2 (exec.c:1697)
==9244==    by 0x427FD2: execpline (exec.c:1484)
==9244==    by 0x427756: execlist (exec.c:1267)
==9244==    by 0x42717C: execode (exec.c:1073)
==9244==    by 0x431299: runshfunc (exec.c:5040)
==9244==    by 0x430E76: doshfunc (exec.c:4920)
==9244==    by 0x4302FB: execshfunc (exec.c:4557)
==9244==    by 0x42D8C1: execcmd (exec.c:3373)
==9244== 
==9244== 
==9244== 2 errors in context 2 of 2:
==9244== Conditional jump or move depends on uninitialised value(s)
==9244==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9244==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9244==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9244==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9244==    by 0x42D8E9: execcmd (exec.c:3378)
==9244==    by 0x428CA0: execpline2 (exec.c:1697)
==9244==    by 0x427FD2: execpline (exec.c:1484)
==9244==    by 0x42779A: execlist (exec.c:1275)
==9244==    by 0x42717C: execode (exec.c:1073)
==9244==    by 0x431299: runshfunc (exec.c:5040)
==9244==    by 0x430E76: doshfunc (exec.c:4920)
==9244==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9244== 
==9244== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9250== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9250-by-pythonnut-on-???
==9250== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9250-by-pythonnut-on-???
==9250== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9250-by-pythonnut-on-???
==9250== 
==9250== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9250== don't want to do, unless you know exactly what you're doing,
==9250== or are doing some strange experiment):
==9250==   /usr/lib/valgrind/../../bin/vgdb --pid=9250 ...command...
==9250== 
==9250== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9250==   /path/to/gdb ./zsh
==9250== and then give GDB the following command
==9250==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9250
==9250== --pid is optional if only one valgrind process is running
==9250== 
==9249== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9249-by-pythonnut-on-???
==9249== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9249-by-pythonnut-on-???
==9249== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9249-by-pythonnut-on-???
==9249== 
==9249== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9249== don't want to do, unless you know exactly what you're doing,
==9249== or are doing some strange experiment):
==9249==   /usr/lib/valgrind/../../bin/vgdb --pid=9249 ...command...
==9249== 
==9249== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9249==   /path/to/gdb ./zsh
==9249== and then give GDB the following command
==9249==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9249
==9249== --pid is optional if only one valgrind process is running
==9249== 
--9250-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--9250-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9250== 
==9250== HEAP SUMMARY:
==9250==     in use at exit: 3,118,133 bytes in 69,054 blocks
==9250==   total heap usage: 925,536 allocs, 856,482 frees, 65,307,509 bytes allocated
==9250== 
==9250== Searching for pointers to 69,054 not-freed blocks
--9250--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9250--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9250--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9250--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9250--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9250--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9250--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9250--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9250--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9250--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9250--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9250--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9250--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9250--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9250--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9250--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9250--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9250--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9250--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9250--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9250--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9250--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9250--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9250--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9250--   Scanning root segment: 0x701a000..0x701afff (4096)
--9250--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9250--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9250--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9250--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9250--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9250--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9250--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9250--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9250--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9250== Checked 4,767,176 bytes
==9250== 
==9250== LEAK SUMMARY:
==9250==    definitely lost: 1,533 bytes in 8 blocks
==9250==    indirectly lost: 6,756 bytes in 7 blocks
==9250==      possibly lost: 0 bytes in 0 blocks
==9250==    still reachable: 3,109,844 bytes in 69,039 blocks
==9250==         suppressed: 0 bytes in 0 blocks
==9250== Rerun with --leak-check=full to see details of leaked memory
==9250== 
==9250== Use --track-origins=yes to see where uninitialised values come from
==9250== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9250== 
==9250== 1 errors in context 1 of 2:
==9250== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9250==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9250==    by 0x488CD0: stringsubst (subst.c:301)
==9250==    by 0x48801B: prefork (subst.c:77)
==9250==    by 0x42B318: execcmd (exec.c:2619)
==9250==    by 0x428CA0: execpline2 (exec.c:1697)
==9250==    by 0x427FD2: execpline (exec.c:1484)
==9250==    by 0x427756: execlist (exec.c:1267)
==9250==    by 0x42717C: execode (exec.c:1073)
==9250==    by 0x431299: runshfunc (exec.c:5040)
==9250==    by 0x430E76: doshfunc (exec.c:4920)
==9250==    by 0x4302FB: execshfunc (exec.c:4557)
==9250==    by 0x42D8C1: execcmd (exec.c:3373)
==9250== 
==9250== 
==9250== 2 errors in context 2 of 2:
==9250== Conditional jump or move depends on uninitialised value(s)
==9250==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9250==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9250==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9250==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9250==    by 0x42D8E9: execcmd (exec.c:3378)
==9250==    by 0x428CA0: execpline2 (exec.c:1697)
==9250==    by 0x427FD2: execpline (exec.c:1484)
==9250==    by 0x42779A: execlist (exec.c:1275)
==9250==    by 0x42717C: execode (exec.c:1073)
==9250==    by 0x431299: runshfunc (exec.c:5040)
==9250==    by 0x430E76: doshfunc (exec.c:4920)
==9250==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9250== 
==9250== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9249-- Caught __NR_exit; running __libc_freeres()
--9249-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9249== 
==9249== HEAP SUMMARY:
==9249==     in use at exit: 3,118,069 bytes in 69,051 blocks
==9249==   total heap usage: 925,534 allocs, 856,483 frees, 65,307,268 bytes allocated
==9249== 
==9249== Searching for pointers to 69,051 not-freed blocks
--9249--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9249--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9249--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9249--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9249--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9249--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9249--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9249--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9249--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9249--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9249--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9249--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9249--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9249--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9249--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9249--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9249--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9249--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9249--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9249--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9249--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9249--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9249--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9249--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9249--   Scanning root segment: 0x701a000..0x701afff (4096)
--9249--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9249--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9249--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9249--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9249--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9249--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9249--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9249--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9249--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9249== Checked 4,766,488 bytes
==9249== 
==9249== LEAK SUMMARY:
==9249==    definitely lost: 1,533 bytes in 8 blocks
==9249==    indirectly lost: 6,756 bytes in 7 blocks
==9249==      possibly lost: 0 bytes in 0 blocks
==9249==    still reachable: 3,109,780 bytes in 69,036 blocks
==9249==         suppressed: 0 bytes in 0 blocks
==9249== Rerun with --leak-check=full to see details of leaked memory
==9249== 
==9249== Use --track-origins=yes to see where uninitialised values come from
==9249== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9249== 
==9249== 1 errors in context 1 of 2:
==9249== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9249==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9249==    by 0x488CD0: stringsubst (subst.c:301)
==9249==    by 0x48801B: prefork (subst.c:77)
==9249==    by 0x42B318: execcmd (exec.c:2619)
==9249==    by 0x428CA0: execpline2 (exec.c:1697)
==9249==    by 0x427FD2: execpline (exec.c:1484)
==9249==    by 0x427756: execlist (exec.c:1267)
==9249==    by 0x42717C: execode (exec.c:1073)
==9249==    by 0x431299: runshfunc (exec.c:5040)
==9249==    by 0x430E76: doshfunc (exec.c:4920)
==9249==    by 0x4302FB: execshfunc (exec.c:4557)
==9249==    by 0x42D8C1: execcmd (exec.c:3373)
==9249== 
==9249== 
==9249== 2 errors in context 2 of 2:
==9249== Conditional jump or move depends on uninitialised value(s)
==9249==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9249==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9249==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9249==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9249==    by 0x42D8E9: execcmd (exec.c:3378)
==9249==    by 0x428CA0: execpline2 (exec.c:1697)
==9249==    by 0x427FD2: execpline (exec.c:1484)
==9249==    by 0x42779A: execlist (exec.c:1275)
==9249==    by 0x42717C: execode (exec.c:1073)
==9249==    by 0x431299: runshfunc (exec.c:5040)
==9249==    by 0x430E76: doshfunc (exec.c:4920)
==9249==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9249== 
==9249== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9252-- Caught __NR_exit; running __libc_freeres()
==9252== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9252-by-pythonnut-on-???
==9252== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9252-by-pythonnut-on-???
==9252== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9252-by-pythonnut-on-???
==9252== 
==9252== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9252== don't want to do, unless you know exactly what you're doing,
==9252== or are doing some strange experiment):
==9252==   /usr/lib/valgrind/../../bin/vgdb --pid=9252 ...command...
==9252== 
==9252== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9252==   /path/to/gdb ./zsh
==9252== and then give GDB the following command
==9252==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9252
==9252== --pid is optional if only one valgrind process is running
==9252== 
--9252-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9252== 
==9252== HEAP SUMMARY:
==9252==     in use at exit: 3,118,076 bytes in 69,051 blocks
==9252==   total heap usage: 925,549 allocs, 856,498 frees, 65,312,266 bytes allocated
==9252== 
==9252== Searching for pointers to 69,051 not-freed blocks
--9252--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9252--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9252--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9252--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9252--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9252--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9252--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9252--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9252--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9252--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9252--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9252--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9252--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9252--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9252--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9252--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9252--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9252--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9252--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9252--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9252--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9252--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9252--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9252--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9252--   Scanning root segment: 0x701a000..0x701afff (4096)
--9252--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9252--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9252--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9252--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9252--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9252--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9252--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9252--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9252--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9252== Checked 4,766,640 bytes
==9252== 
==9252== LEAK SUMMARY:
==9252==    definitely lost: 1,533 bytes in 8 blocks
==9252==    indirectly lost: 6,756 bytes in 7 blocks
==9252==      possibly lost: 0 bytes in 0 blocks
==9252==    still reachable: 3,109,787 bytes in 69,036 blocks
==9252==         suppressed: 0 bytes in 0 blocks
==9252== Rerun with --leak-check=full to see details of leaked memory
==9252== 
==9252== Use --track-origins=yes to see where uninitialised values come from
==9252== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9252== 
==9252== 1 errors in context 1 of 2:
==9252== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9252==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9252==    by 0x488CD0: stringsubst (subst.c:301)
==9252==    by 0x48801B: prefork (subst.c:77)
==9252==    by 0x42B318: execcmd (exec.c:2619)
==9252==    by 0x428CA0: execpline2 (exec.c:1697)
==9252==    by 0x427FD2: execpline (exec.c:1484)
==9252==    by 0x427756: execlist (exec.c:1267)
==9252==    by 0x42717C: execode (exec.c:1073)
==9252==    by 0x431299: runshfunc (exec.c:5040)
==9252==    by 0x430E76: doshfunc (exec.c:4920)
==9252==    by 0x4302FB: execshfunc (exec.c:4557)
==9252==    by 0x42D8C1: execcmd (exec.c:3373)
==9252== 
==9252== 
==9252== 2 errors in context 2 of 2:
==9252== Conditional jump or move depends on uninitialised value(s)
==9252==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9252==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9252==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9252==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9252==    by 0x42D8E9: execcmd (exec.c:3378)
==9252==    by 0x428CA0: execpline2 (exec.c:1697)
==9252==    by 0x427FD2: execpline (exec.c:1484)
==9252==    by 0x42779A: execlist (exec.c:1275)
==9252==    by 0x42717C: execode (exec.c:1073)
==9252==    by 0x431299: runshfunc (exec.c:5040)
==9252==    by 0x430E76: doshfunc (exec.c:4920)
==9252==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9252== 
==9252== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9253-- Caught __NR_exit; running __libc_freeres()
==9253== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9253-by-pythonnut-on-???
==9253== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9253-by-pythonnut-on-???
==9253== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9253-by-pythonnut-on-???
==9253== 
==9253== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9253== don't want to do, unless you know exactly what you're doing,
==9253== or are doing some strange experiment):
==9253==   /usr/lib/valgrind/../../bin/vgdb --pid=9253 ...command...
==9253== 
==9253== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9253==   /path/to/gdb ./zsh
==9253== and then give GDB the following command
==9253==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9253
==9253== --pid is optional if only one valgrind process is running
==9253== 
--9253-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9253== 
==9253== HEAP SUMMARY:
==9253==     in use at exit: 3,118,172 bytes in 69,051 blocks
==9253==   total heap usage: 925,565 allocs, 856,514 frees, 65,317,053 bytes allocated
==9253== 
==9253== Searching for pointers to 69,051 not-freed blocks
--9253--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9253--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9253--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9253--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9253--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9253--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9253--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9253--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9253--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9253--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9253--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9253--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9253--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9253--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9253--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9253--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9253--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9253--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9253--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9253--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9253--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9253--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9253--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9253--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9253--   Scanning root segment: 0x701a000..0x701afff (4096)
--9253--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9253--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9253--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9253--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9253--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9253--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9253--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9253--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9253--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9253== Checked 4,765,952 bytes
==9253== 
==9253== LEAK SUMMARY:
==9253==    definitely lost: 1,533 bytes in 8 blocks
==9253==    indirectly lost: 6,756 bytes in 7 blocks
==9253==      possibly lost: 0 bytes in 0 blocks
==9253==    still reachable: 3,109,883 bytes in 69,036 blocks
==9253==         suppressed: 0 bytes in 0 blocks
==9253== Rerun with --leak-check=full to see details of leaked memory
==9253== 
==9253== Use --track-origins=yes to see where uninitialised values come from
==9253== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9253== 
==9253== 1 errors in context 1 of 2:
==9253== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9253==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9253==    by 0x488CD0: stringsubst (subst.c:301)
==9253==    by 0x48801B: prefork (subst.c:77)
==9253==    by 0x42B318: execcmd (exec.c:2619)
==9253==    by 0x428CA0: execpline2 (exec.c:1697)
==9253==    by 0x427FD2: execpline (exec.c:1484)
==9253==    by 0x427756: execlist (exec.c:1267)
==9253==    by 0x42717C: execode (exec.c:1073)
==9253==    by 0x431299: runshfunc (exec.c:5040)
==9253==    by 0x430E76: doshfunc (exec.c:4920)
==9253==    by 0x4302FB: execshfunc (exec.c:4557)
==9253==    by 0x42D8C1: execcmd (exec.c:3373)
==9253== 
==9253== 
==9253== 2 errors in context 2 of 2:
==9253== Conditional jump or move depends on uninitialised value(s)
==9253==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9253==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9253==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9253==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9253==    by 0x42D8E9: execcmd (exec.c:3378)
==9253==    by 0x428CA0: execpline2 (exec.c:1697)
==9253==    by 0x427FD2: execpline (exec.c:1484)
==9253==    by 0x42779A: execlist (exec.c:1275)
==9253==    by 0x42717C: execode (exec.c:1073)
==9253==    by 0x431299: runshfunc (exec.c:5040)
==9253==    by 0x430E76: doshfunc (exec.c:4920)
==9253==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9253== 
==9253== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9254== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9254-by-pythonnut-on-???
==9254== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9254-by-pythonnut-on-???
==9254== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9254-by-pythonnut-on-???
==9254== 
==9254== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9254== don't want to do, unless you know exactly what you're doing,
==9254== or are doing some strange experiment):
==9254==   /usr/lib/valgrind/../../bin/vgdb --pid=9254 ...command...
==9254== 
==9254== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9254==   /path/to/gdb ./zsh
==9254== and then give GDB the following command
==9254==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9254
==9254== --pid is optional if only one valgrind process is running
==9254== 
--9254-- Caught __NR_exit; running __libc_freeres()
--9254-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9254== 
==9254== HEAP SUMMARY:
==9254==     in use at exit: 3,118,418 bytes in 69,057 blocks
==9254==   total heap usage: 925,613 allocs, 856,556 frees, 65,326,077 bytes allocated
==9254== 
==9254== Searching for pointers to 69,057 not-freed blocks
--9254--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9254--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9254--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9254--   Scanning root segment: 0x4037000..0x403afff (16384)
--9254--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9254--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9254--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9254--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9254--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9254--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9254--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9254--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9254--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9254--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9254--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9254--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9254--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9254--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9254--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9254--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9254--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9254--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9254--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9254--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9254--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9254--   Scanning root segment: 0x701a000..0x701afff (4096)
--9254--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9254--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9254--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9254--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9254--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9254--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9254--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9254--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9254--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9254== Checked 4,782,512 bytes
==9254== 
==9254== LEAK SUMMARY:
==9254==    definitely lost: 1,533 bytes in 8 blocks
==9254==    indirectly lost: 6,756 bytes in 7 blocks
==9254==      possibly lost: 0 bytes in 0 blocks
==9254==    still reachable: 3,110,129 bytes in 69,042 blocks
==9254==         suppressed: 0 bytes in 0 blocks
==9254== Rerun with --leak-check=full to see details of leaked memory
==9254== 
==9254== Use --track-origins=yes to see where uninitialised values come from
==9254== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9254== 
==9254== 1 errors in context 1 of 2:
==9254== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9254==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9254==    by 0x488CD0: stringsubst (subst.c:301)
==9254==    by 0x48801B: prefork (subst.c:77)
==9254==    by 0x42B318: execcmd (exec.c:2619)
==9254==    by 0x428CA0: execpline2 (exec.c:1697)
==9254==    by 0x427FD2: execpline (exec.c:1484)
==9254==    by 0x427756: execlist (exec.c:1267)
==9254==    by 0x42717C: execode (exec.c:1073)
==9254==    by 0x431299: runshfunc (exec.c:5040)
==9254==    by 0x430E76: doshfunc (exec.c:4920)
==9254==    by 0x4302FB: execshfunc (exec.c:4557)
==9254==    by 0x42D8C1: execcmd (exec.c:3373)
==9254== 
==9254== 
==9254== 2 errors in context 2 of 2:
==9254== Conditional jump or move depends on uninitialised value(s)
==9254==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9254==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9254==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9254==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9254==    by 0x42D8E9: execcmd (exec.c:3378)
==9254==    by 0x428CA0: execpline2 (exec.c:1697)
==9254==    by 0x427FD2: execpline (exec.c:1484)
==9254==    by 0x42779A: execlist (exec.c:1275)
==9254==    by 0x42717C: execode (exec.c:1073)
==9254==    by 0x431299: runshfunc (exec.c:5040)
==9254==    by 0x430E76: doshfunc (exec.c:4920)
==9254==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9254== 
==9254== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9255-- Caught __NR_exit; running __libc_freeres()
==9255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9255-by-pythonnut-on-???
==9255== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9255-by-pythonnut-on-???
==9255== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9255-by-pythonnut-on-???
==9255== 
==9255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9255== don't want to do, unless you know exactly what you're doing,
==9255== or are doing some strange experiment):
==9255==   /usr/lib/valgrind/../../bin/vgdb --pid=9255 ...command...
==9255== 
==9255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9255==   /path/to/gdb ./zsh
==9255== and then give GDB the following command
==9255==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9255
==9255== --pid is optional if only one valgrind process is running
==9255== 
--9255-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9255== 
==9255== HEAP SUMMARY:
==9255==     in use at exit: 3,118,354 bytes in 69,057 blocks
==9255==   total heap usage: 925,593 allocs, 856,536 frees, 65,323,847 bytes allocated
==9255== 
==9255== Searching for pointers to 69,057 not-freed blocks
--9255--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9255--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9255--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9255--   Scanning root segment: 0x4037000..0x403afff (16384)
--9255--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9255--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9255--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9255--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9255--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9255--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9255--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9255--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9255--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9255--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9255--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9255--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9255--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9255--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9255--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9255--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9255--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9255--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9255--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9255--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9255--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9255--   Scanning root segment: 0x701a000..0x701afff (4096)
--9255--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9255--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9255--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9255--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9255--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9255--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9255--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9255--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9255--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9255== Checked 4,782,432 bytes
==9255== 
==9255== LEAK SUMMARY:
==9255==    definitely lost: 1,533 bytes in 8 blocks
==9255==    indirectly lost: 6,756 bytes in 7 blocks
==9255==      possibly lost: 0 bytes in 0 blocks
==9255==    still reachable: 3,110,065 bytes in 69,042 blocks
==9255==         suppressed: 0 bytes in 0 blocks
==9255== Rerun with --leak-check=full to see details of leaked memory
==9255== 
==9255== Use --track-origins=yes to see where uninitialised values come from
==9255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9255== 
==9255== 1 errors in context 1 of 2:
==9255== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9255==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9255==    by 0x488CD0: stringsubst (subst.c:301)
==9255==    by 0x48801B: prefork (subst.c:77)
==9255==    by 0x42B318: execcmd (exec.c:2619)
==9255==    by 0x428CA0: execpline2 (exec.c:1697)
==9255==    by 0x427FD2: execpline (exec.c:1484)
==9255==    by 0x427756: execlist (exec.c:1267)
==9255==    by 0x42717C: execode (exec.c:1073)
==9255==    by 0x431299: runshfunc (exec.c:5040)
==9255==    by 0x430E76: doshfunc (exec.c:4920)
==9255==    by 0x4302FB: execshfunc (exec.c:4557)
==9255==    by 0x42D8C1: execcmd (exec.c:3373)
==9255== 
==9255== 
==9255== 2 errors in context 2 of 2:
==9255== Conditional jump or move depends on uninitialised value(s)
==9255==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9255==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9255==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9255==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9255==    by 0x42D8E9: execcmd (exec.c:3378)
==9255==    by 0x428CA0: execpline2 (exec.c:1697)
==9255==    by 0x427FD2: execpline (exec.c:1484)
==9255==    by 0x42779A: execlist (exec.c:1275)
==9255==    by 0x42717C: execode (exec.c:1073)
==9255==    by 0x431299: runshfunc (exec.c:5040)
==9255==    by 0x430E76: doshfunc (exec.c:4920)
==9255==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9255== 
==9255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9258-by-pythonnut-on-???
==9258== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9258-by-pythonnut-on-???
==9258== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9258-by-pythonnut-on-???
==9258== 
==9258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9258== don't want to do, unless you know exactly what you're doing,
==9258== or are doing some strange experiment):
==9258==   /usr/lib/valgrind/../../bin/vgdb --pid=9258 ...command...
==9258== 
==9258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9258==   /path/to/gdb ./zsh
==9258== and then give GDB the following command
==9258==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9258
==9258== --pid is optional if only one valgrind process is running
==9258== 
--9258-- Caught __NR_exit; running __libc_freeres()
--9258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9258== 
==9258== HEAP SUMMARY:
==9258==     in use at exit: 3,118,384 bytes in 69,058 blocks
==9258==   total heap usage: 925,606 allocs, 856,548 frees, 65,326,536 bytes allocated
==9258== 
==9258== Searching for pointers to 69,058 not-freed blocks
--9258--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9258--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9258--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9258--   Scanning root segment: 0x4037000..0x403afff (16384)
--9258--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9258--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9258--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9258--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9258--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9258--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9258--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9258--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9258--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9258--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9258--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9258--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9258--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9258--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9258--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9258--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9258--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9258--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9258--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9258--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9258--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9258--   Scanning root segment: 0x701a000..0x701afff (4096)
--9258--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9258--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9258--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9258--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9258--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9258--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9258--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9258--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9258--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9258== Checked 4,781,944 bytes
==9258== 
==9258== LEAK SUMMARY:
==9258==    definitely lost: 1,533 bytes in 8 blocks
==9258==    indirectly lost: 6,756 bytes in 7 blocks
==9258==      possibly lost: 0 bytes in 0 blocks
==9258==    still reachable: 3,110,095 bytes in 69,043 blocks
==9258==         suppressed: 0 bytes in 0 blocks
==9258== Rerun with --leak-check=full to see details of leaked memory
==9258== 
==9258== Use --track-origins=yes to see where uninitialised values come from
==9258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9258== 
==9258== 1 errors in context 1 of 2:
==9258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9258==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9258==    by 0x488CD0: stringsubst (subst.c:301)
==9258==    by 0x48801B: prefork (subst.c:77)
==9258==    by 0x42B318: execcmd (exec.c:2619)
==9258==    by 0x428CA0: execpline2 (exec.c:1697)
==9258==    by 0x427FD2: execpline (exec.c:1484)
==9258==    by 0x427756: execlist (exec.c:1267)
==9258==    by 0x42717C: execode (exec.c:1073)
==9258==    by 0x431299: runshfunc (exec.c:5040)
==9258==    by 0x430E76: doshfunc (exec.c:4920)
==9258==    by 0x4302FB: execshfunc (exec.c:4557)
==9258==    by 0x42D8C1: execcmd (exec.c:3373)
==9258== 
==9258== 
==9258== 2 errors in context 2 of 2:
==9258== Conditional jump or move depends on uninitialised value(s)
==9258==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9258==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9258==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9258==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9258==    by 0x42D8E9: execcmd (exec.c:3378)
==9258==    by 0x428CA0: execpline2 (exec.c:1697)
==9258==    by 0x427FD2: execpline (exec.c:1484)
==9258==    by 0x42779A: execlist (exec.c:1275)
==9258==    by 0x42717C: execode (exec.c:1073)
==9258==    by 0x431299: runshfunc (exec.c:5040)
==9258==    by 0x430E76: doshfunc (exec.c:4920)
==9258==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9258== 
==9258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9259-- Caught __NR_exit; running __libc_freeres()
==9259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9259-by-pythonnut-on-???
==9259== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9259-by-pythonnut-on-???
==9259== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9259-by-pythonnut-on-???
==9259== 
==9259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9259== don't want to do, unless you know exactly what you're doing,
==9259== or are doing some strange experiment):
==9259==   /usr/lib/valgrind/../../bin/vgdb --pid=9259 ...command...
==9259== 
==9259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9259==   /path/to/gdb ./zsh
==9259== and then give GDB the following command
==9259==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9259
==9259== --pid is optional if only one valgrind process is running
==9259== 
--9259-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9259== 
==9259== HEAP SUMMARY:
==9259==     in use at exit: 3,122,304 bytes in 69,069 blocks
==9259==   total heap usage: 927,059 allocs, 857,990 frees, 65,417,903 bytes allocated
==9259== 
==9259== Searching for pointers to 69,069 not-freed blocks
--9259--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9259--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9259--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9259--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9259--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9259--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9259--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9259--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9259--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9259--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9259--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9259--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9259--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9259--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9259--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9259--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9259--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9259--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9259--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9259--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9259--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9259--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9259--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9259--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9259--   Scanning root segment: 0x701a000..0x701afff (4096)
--9259--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9259--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9259--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9259--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9259--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9259--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9259--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9259--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9259--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9259== Checked 4,771,064 bytes
==9259== 
==9259== LEAK SUMMARY:
==9259==    definitely lost: 1,533 bytes in 8 blocks
==9259==    indirectly lost: 6,756 bytes in 7 blocks
==9259==      possibly lost: 0 bytes in 0 blocks
==9259==    still reachable: 3,114,015 bytes in 69,054 blocks
==9259==         suppressed: 0 bytes in 0 blocks
==9259== Rerun with --leak-check=full to see details of leaked memory
==9259== 
==9259== Use --track-origins=yes to see where uninitialised values come from
==9259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9259== 
==9259== 1 errors in context 1 of 2:
==9259== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9259==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9259==    by 0x488CD0: stringsubst (subst.c:301)
==9259==    by 0x48801B: prefork (subst.c:77)
==9259==    by 0x42B318: execcmd (exec.c:2619)
==9259==    by 0x428CA0: execpline2 (exec.c:1697)
==9259==    by 0x427FD2: execpline (exec.c:1484)
==9259==    by 0x427756: execlist (exec.c:1267)
==9259==    by 0x42717C: execode (exec.c:1073)
==9259==    by 0x431299: runshfunc (exec.c:5040)
==9259==    by 0x430E76: doshfunc (exec.c:4920)
==9259==    by 0x4302FB: execshfunc (exec.c:4557)
==9259==    by 0x42D8C1: execcmd (exec.c:3373)
==9259== 
==9259== 
==9259== 2 errors in context 2 of 2:
==9259== Conditional jump or move depends on uninitialised value(s)
==9259==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9259==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9259==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9259==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9259==    by 0x42D8E9: execcmd (exec.c:3378)
==9259==    by 0x428CA0: execpline2 (exec.c:1697)
==9259==    by 0x427FD2: execpline (exec.c:1484)
==9259==    by 0x42779A: execlist (exec.c:1275)
==9259==    by 0x42717C: execode (exec.c:1073)
==9259==    by 0x431299: runshfunc (exec.c:5040)
==9259==    by 0x430E76: doshfunc (exec.c:4920)
==9259==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9259== 
==9259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9260-by-pythonnut-on-???
==9260== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9260-by-pythonnut-on-???
==9260== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9260-by-pythonnut-on-???
==9260== 
==9260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9260== don't want to do, unless you know exactly what you're doing,
==9260== or are doing some strange experiment):
==9260==   /usr/lib/valgrind/../../bin/vgdb --pid=9260 ...command...
==9260== 
==9260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9260==   /path/to/gdb ./zsh
==9260== and then give GDB the following command
==9260==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9260
==9260== --pid is optional if only one valgrind process is running
==9260== 
--9260-- Caught __NR_exit; running __libc_freeres()
--9260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9260== 
==9260== HEAP SUMMARY:
==9260==     in use at exit: 3,122,672 bytes in 69,071 blocks
==9260==   total heap usage: 927,067 allocs, 857,996 frees, 65,426,783 bytes allocated
==9260== 
==9260== Searching for pointers to 69,071 not-freed blocks
--9260--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9260--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9260--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9260--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9260--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9260--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9260--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9260--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9260--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9260--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9260--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9260--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9260--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9260--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9260--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9260--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9260--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9260--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9260--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9260--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9260--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9260--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9260--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9260--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9260--   Scanning root segment: 0x701a000..0x701afff (4096)
--9260--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9260--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9260--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9260--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9260--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9260--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9260--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9260--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9260--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9260== Checked 4,773,440 bytes
==9260== 
==9260== LEAK SUMMARY:
==9260==    definitely lost: 1,533 bytes in 8 blocks
==9260==    indirectly lost: 6,756 bytes in 7 blocks
==9260==      possibly lost: 0 bytes in 0 blocks
==9260==    still reachable: 3,114,383 bytes in 69,056 blocks
==9260==         suppressed: 0 bytes in 0 blocks
==9260== Rerun with --leak-check=full to see details of leaked memory
==9260== 
==9260== Use --track-origins=yes to see where uninitialised values come from
==9260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9260== 
==9260== 1 errors in context 1 of 2:
==9260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9260==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9260==    by 0x488CD0: stringsubst (subst.c:301)
==9260==    by 0x48801B: prefork (subst.c:77)
==9260==    by 0x42B318: execcmd (exec.c:2619)
==9260==    by 0x428CA0: execpline2 (exec.c:1697)
==9260==    by 0x427FD2: execpline (exec.c:1484)
==9260==    by 0x427756: execlist (exec.c:1267)
==9260==    by 0x42717C: execode (exec.c:1073)
==9260==    by 0x431299: runshfunc (exec.c:5040)
==9260==    by 0x430E76: doshfunc (exec.c:4920)
==9260==    by 0x4302FB: execshfunc (exec.c:4557)
==9260==    by 0x42D8C1: execcmd (exec.c:3373)
==9260== 
==9260== 
==9260== 2 errors in context 2 of 2:
==9260== Conditional jump or move depends on uninitialised value(s)
==9260==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9260==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9260==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9260==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9260==    by 0x42D8E9: execcmd (exec.c:3378)
==9260==    by 0x428CA0: execpline2 (exec.c:1697)
==9260==    by 0x427FD2: execpline (exec.c:1484)
==9260==    by 0x42779A: execlist (exec.c:1275)
==9260==    by 0x42717C: execode (exec.c:1073)
==9260==    by 0x431299: runshfunc (exec.c:5040)
==9260==    by 0x430E76: doshfunc (exec.c:4920)
==9260==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9260== 
==9260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==9261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9261-by-pythonnut-on-???
==9261== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9261-by-pythonnut-on-???
==9261== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9261-by-pythonnut-on-???
==9261== 
==9261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9261== don't want to do, unless you know exactly what you're doing,
==9261== or are doing some strange experiment):
==9261==   /usr/lib/valgrind/../../bin/vgdb --pid=9261 ...command...
==9261== 
==9261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9261==   /path/to/gdb ./zsh
==9261== and then give GDB the following command
==9261==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9261
==9261== --pid is optional if only one valgrind process is running
==9261== 
==9262== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9262-by-pythonnut-on-???
==9262== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9262-by-pythonnut-on-???
==9262== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9262-by-pythonnut-on-???
==9262== 
==9262== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9262== don't want to do, unless you know exactly what you're doing,
==9262== or are doing some strange experiment):
==9262==   /usr/lib/valgrind/../../bin/vgdb --pid=9262 ...command...
==9262== 
==9262== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9262==   /path/to/gdb ./zsh
==9262== and then give GDB the following command
==9262==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9262
==9262== --pid is optional if only one valgrind process is running
==9262== 
==9263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9263-by-pythonnut-on-???
==9263== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9263-by-pythonnut-on-???
==9263== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9263-by-pythonnut-on-???
==9263== 
==9263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9263== don't want to do, unless you know exactly what you're doing,
==9263== or are doing some strange experiment):
==9263==   /usr/lib/valgrind/../../bin/vgdb --pid=9263 ...command...
==9263== 
==9263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9263==   /path/to/gdb ./zsh
==9263== and then give GDB the following command
==9263==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9263
==9263== --pid is optional if only one valgrind process is running
==9263== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--9263-- Caught __NR_exit; running __libc_freeres()
--9263-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9263== 
==9263== HEAP SUMMARY:
==9263==     in use at exit: 3,126,864 bytes in 69,144 blocks
==9263==   total heap usage: 927,236 allocs, 858,092 frees, 65,456,527 bytes allocated
==9263== 
==9263== Searching for pointers to 69,144 not-freed blocks
--9263--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9263--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9263--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9263--   Scanning root segment: 0x4037000..0x403afff (16384)
--9263--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9263--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9263--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9263--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9263--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9263--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9263--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9263--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9263--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9263--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9263--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9263--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9263--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9263--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9263--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9263--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9263--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9263--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9263--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9263--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9263--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9263--   Scanning root segment: 0x701a000..0x701afff (4096)
--9263--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9263--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9263--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9263--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9263--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9263--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9263--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9263--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9263--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9263== Checked 4,796,112 bytes
==9263== 
==9263== LEAK SUMMARY:
==9263==    definitely lost: 1,533 bytes in 8 blocks
==9263==    indirectly lost: 6,756 bytes in 7 blocks
==9263==      possibly lost: 0 bytes in 0 blocks
==9263==    still reachable: 3,118,575 bytes in 69,129 blocks
==9263==         suppressed: 0 bytes in 0 blocks
==9263== Rerun with --leak-check=full to see details of leaked memory
==9263== 
==9263== Use --track-origins=yes to see where uninitialised values come from
==9263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9263== 
==9263== 1 errors in context 1 of 2:
==9263== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9263==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9263==    by 0x488CD0: stringsubst (subst.c:301)
==9263==    by 0x48801B: prefork (subst.c:77)
==9263==    by 0x42B318: execcmd (exec.c:2619)
==9263==    by 0x428CA0: execpline2 (exec.c:1697)
==9263==    by 0x427FD2: execpline (exec.c:1484)
==9263==    by 0x427756: execlist (exec.c:1267)
==9263==    by 0x42717C: execode (exec.c:1073)
==9263==    by 0x431299: runshfunc (exec.c:5040)
==9263==    by 0x430E76: doshfunc (exec.c:4920)
==9263==    by 0x4302FB: execshfunc (exec.c:4557)
==9263==    by 0x42D8C1: execcmd (exec.c:3373)
==9263== 
==9263== 
==9263== 2 errors in context 2 of 2:
==9263== Conditional jump or move depends on uninitialised value(s)
==9263==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9263==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9263==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9263==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9263==    by 0x42D8E9: execcmd (exec.c:3378)
==9263==    by 0x428CA0: execpline2 (exec.c:1697)
==9263==    by 0x427FD2: execpline (exec.c:1484)
==9263==    by 0x42779A: execlist (exec.c:1275)
==9263==    by 0x42717C: execode (exec.c:1073)
==9263==    by 0x431299: runshfunc (exec.c:5040)
==9263==    by 0x430E76: doshfunc (exec.c:4920)
==9263==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9263== 
==9263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9266-- Caught __NR_exit; running __libc_freeres()
==9266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9266-by-pythonnut-on-???
==9266== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9266-by-pythonnut-on-???
==9266== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9266-by-pythonnut-on-???
==9266== 
==9266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9266== don't want to do, unless you know exactly what you're doing,
==9266== or are doing some strange experiment):
==9266==   /usr/lib/valgrind/../../bin/vgdb --pid=9266 ...command...
==9266== 
==9266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9266==   /path/to/gdb ./zsh
==9266== and then give GDB the following command
==9266==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9266
==9266== --pid is optional if only one valgrind process is running
==9266== 
==9267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9267-by-pythonnut-on-???
==9267== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9267-by-pythonnut-on-???
==9267== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9267-by-pythonnut-on-???
==9267== 
==9267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9267== don't want to do, unless you know exactly what you're doing,
==9267== or are doing some strange experiment):
==9267==   /usr/lib/valgrind/../../bin/vgdb --pid=9267 ...command...
==9267== 
==9267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9267==   /path/to/gdb ./zsh
==9267== and then give GDB the following command
==9267==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9267
==9267== --pid is optional if only one valgrind process is running
==9267== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9266== 
==9266== HEAP SUMMARY:
==9266==     in use at exit: 3,163,731 bytes in 69,151 blocks
==9266==   total heap usage: 927,243 allocs, 858,092 frees, 65,496,450 bytes allocated
==9266== 
==9266== Searching for pointers to 69,151 not-freed blocks
--9266--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9266--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9266--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9266--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9266--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9266--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9266--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9266--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9266--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9266--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9266--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9266--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9266--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9266--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9266--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9266--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9266--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9266--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9266--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9266--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9266--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9266--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9266--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9266--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9266--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9266--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9266--   Scanning root segment: 0x701a000..0x701afff (4096)
--9266--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9266--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9266--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9266--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9266--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9266--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9266--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9266--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9266--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9266== Checked 4,907,912 bytes
==9266== 
==9266== LEAK SUMMARY:
==9266==    definitely lost: 1,533 bytes in 8 blocks
==9266==    indirectly lost: 6,756 bytes in 7 blocks
==9266==      possibly lost: 0 bytes in 0 blocks
==9266==    still reachable: 3,155,442 bytes in 69,136 blocks
==9266==         suppressed: 0 bytes in 0 blocks
==9266== Rerun with --leak-check=full to see details of leaked memory
==9266== 
==9266== Use --track-origins=yes to see where uninitialised values come from
==9266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9266== 
==9266== 1 errors in context 1 of 2:
==9266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9266==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9266==    by 0x488CD0: stringsubst (subst.c:301)
==9266==    by 0x48801B: prefork (subst.c:77)
==9266==    by 0x42B318: execcmd (exec.c:2619)
==9266==    by 0x428CA0: execpline2 (exec.c:1697)
==9266==    by 0x427FD2: execpline (exec.c:1484)
==9266==    by 0x427756: execlist (exec.c:1267)
==9266==    by 0x42717C: execode (exec.c:1073)
==9266==    by 0x431299: runshfunc (exec.c:5040)
==9266==    by 0x430E76: doshfunc (exec.c:4920)
==9266==    by 0x4302FB: execshfunc (exec.c:4557)
==9266==    by 0x42D8C1: execcmd (exec.c:3373)
==9266== 
==9266== 
==9266== 2 errors in context 2 of 2:
==9266== Conditional jump or move depends on uninitialised value(s)
==9266==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9266==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9266==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9266==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9266==    by 0x42D8E9: execcmd (exec.c:3378)
==9266==    by 0x428CA0: execpline2 (exec.c:1697)
==9266==    by 0x427FD2: execpline (exec.c:1484)
==9266==    by 0x42779A: execlist (exec.c:1275)
==9266==    by 0x42717C: execode (exec.c:1073)
==9266==    by 0x431299: runshfunc (exec.c:5040)
==9266==    by 0x430E76: doshfunc (exec.c:4920)
==9266==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9266== 
==9266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9265== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9265-by-pythonnut-on-???
==9265== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9265-by-pythonnut-on-???
==9265== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9265-by-pythonnut-on-???
==9265== 
==9265== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9265== don't want to do, unless you know exactly what you're doing,
==9265== or are doing some strange experiment):
==9265==   /usr/lib/valgrind/../../bin/vgdb --pid=9265 ...command...
==9265== 
==9265== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9265==   /path/to/gdb ./zsh
==9265== and then give GDB the following command
==9265==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9265
==9265== --pid is optional if only one valgrind process is running
==9265== 
--9265-- Caught __NR_exit; running __libc_freeres()
--9265-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9265== 
==9265== HEAP SUMMARY:
==9265==     in use at exit: 3,163,667 bytes in 69,148 blocks
==9265==   total heap usage: 927,245 allocs, 858,097 frees, 65,496,994 bytes allocated
==9265== 
==9265== Searching for pointers to 69,148 not-freed blocks
--9265--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9265--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9265--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9265--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9265--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9265--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9265--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9265--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9265--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9265--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9265--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9265--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9265--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9265--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9265--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9265--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9265--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9265--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9265--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9265--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9265--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9265--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9265--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9265--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9265--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9265--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9265--   Scanning root segment: 0x701a000..0x701afff (4096)
--9265--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9265--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9265--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9265--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9265--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9265--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9265--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9265--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9265--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9265== Checked 4,907,224 bytes
==9265== 
==9265== LEAK SUMMARY:
==9265==    definitely lost: 1,533 bytes in 8 blocks
==9265==    indirectly lost: 6,756 bytes in 7 blocks
==9265==      possibly lost: 0 bytes in 0 blocks
==9265==    still reachable: 3,155,378 bytes in 69,133 blocks
==9265==         suppressed: 0 bytes in 0 blocks
==9265== Rerun with --leak-check=full to see details of leaked memory
==9265== 
==9265== Use --track-origins=yes to see where uninitialised values come from
==9265== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9265== 
==9265== 1 errors in context 1 of 2:
==9265== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9265==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9265==    by 0x488CD0: stringsubst (subst.c:301)
==9265==    by 0x48801B: prefork (subst.c:77)
==9265==    by 0x42B318: execcmd (exec.c:2619)
==9265==    by 0x428CA0: execpline2 (exec.c:1697)
==9265==    by 0x427FD2: execpline (exec.c:1484)
==9265==    by 0x427756: execlist (exec.c:1267)
==9265==    by 0x42717C: execode (exec.c:1073)
==9265==    by 0x431299: runshfunc (exec.c:5040)
==9265==    by 0x430E76: doshfunc (exec.c:4920)
==9265==    by 0x4302FB: execshfunc (exec.c:4557)
==9265==    by 0x42D8C1: execcmd (exec.c:3373)
==9265== 
==9265== 
==9265== 2 errors in context 2 of 2:
==9265== Conditional jump or move depends on uninitialised value(s)
==9265==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9265==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9265==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9265==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9265==    by 0x42D8E9: execcmd (exec.c:3378)
==9265==    by 0x428CA0: execpline2 (exec.c:1697)
==9265==    by 0x427FD2: execpline (exec.c:1484)
==9265==    by 0x42779A: execlist (exec.c:1275)
==9265==    by 0x42717C: execode (exec.c:1073)
==9265==    by 0x431299: runshfunc (exec.c:5040)
==9265==    by 0x430E76: doshfunc (exec.c:4920)
==9265==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9265== 
==9265== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9270-by-pythonnut-on-???
==9270== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9270-by-pythonnut-on-???
==9270== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9270-by-pythonnut-on-???
==9270== 
==9270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9270== don't want to do, unless you know exactly what you're doing,
==9270== or are doing some strange experiment):
==9270==   /usr/lib/valgrind/../../bin/vgdb --pid=9270 ...command...
==9270== 
==9270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9270==   /path/to/gdb ./zsh
==9270== and then give GDB the following command
==9270==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9270
==9270== --pid is optional if only one valgrind process is running
==9270== 
==9271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9271-by-pythonnut-on-???
==9271== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9271-by-pythonnut-on-???
==9271== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9271-by-pythonnut-on-???
==9271== 
==9271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9271== don't want to do, unless you know exactly what you're doing,
==9271== or are doing some strange experiment):
==9271==   /usr/lib/valgrind/../../bin/vgdb --pid=9271 ...command...
==9271== 
==9271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9271==   /path/to/gdb ./zsh
==9271== and then give GDB the following command
==9271==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9271
==9271== --pid is optional if only one valgrind process is running
==9271== 
--9271-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9271-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9271== 
==9271== HEAP SUMMARY:
==9271==     in use at exit: 3,200,345 bytes in 69,154 blocks
==9271==   total heap usage: 927,252 allocs, 858,098 frees, 65,535,277 bytes allocated
==9271== 
==9271== Searching for pointers to 69,154 not-freed blocks
--9271--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9271--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9271--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9271--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9271--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9271--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9271--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9271--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9271--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9271--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9271--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9271--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9271--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9271--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9271--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9271--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9271--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9271--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9271--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9271--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9271--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9271--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9271--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9271--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9271--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9271--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9271--   Scanning root segment: 0x701a000..0x701afff (4096)
--9271--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9271--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9271--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9271--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9271--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9271--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9271--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9271--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9271--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9271== Checked 4,981,400 bytes
==9271== 
==9271== LEAK SUMMARY:
==9271==    definitely lost: 1,533 bytes in 8 blocks
==9271==    indirectly lost: 6,756 bytes in 7 blocks
==9271==      possibly lost: 0 bytes in 0 blocks
==9271==    still reachable: 3,192,056 bytes in 69,139 blocks
==9271==         suppressed: 0 bytes in 0 blocks
==9271== Rerun with --leak-check=full to see details of leaked memory
==9271== 
==9271== Use --track-origins=yes to see where uninitialised values come from
==9271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9271== 
==9271== 1 errors in context 1 of 2:
==9271== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9271==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9271==    by 0x488CD0: stringsubst (subst.c:301)
==9271==    by 0x48801B: prefork (subst.c:77)
==9271==    by 0x42B318: execcmd (exec.c:2619)
==9271==    by 0x428CA0: execpline2 (exec.c:1697)
==9271==    by 0x427FD2: execpline (exec.c:1484)
==9271==    by 0x427756: execlist (exec.c:1267)
==9271==    by 0x42717C: execode (exec.c:1073)
==9271==    by 0x431299: runshfunc (exec.c:5040)
==9271==    by 0x430E76: doshfunc (exec.c:4920)
==9271==    by 0x4302FB: execshfunc (exec.c:4557)
==9271==    by 0x42D8C1: execcmd (exec.c:3373)
==9271== 
==9271== 
==9271== 2 errors in context 2 of 2:
==9271== Conditional jump or move depends on uninitialised value(s)
==9271==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9271==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9271==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9271==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9271==    by 0x42D8E9: execcmd (exec.c:3378)
==9271==    by 0x428CA0: execpline2 (exec.c:1697)
==9271==    by 0x427FD2: execpline (exec.c:1484)
==9271==    by 0x42779A: execlist (exec.c:1275)
==9271==    by 0x42717C: execode (exec.c:1073)
==9271==    by 0x431299: runshfunc (exec.c:5040)
==9271==    by 0x430E76: doshfunc (exec.c:4920)
==9271==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9271== 
==9271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9270-- Caught __NR_exit; running __libc_freeres()
--9270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9270== 
==9270== HEAP SUMMARY:
==9270==     in use at exit: 3,163,705 bytes in 69,151 blocks
==9270==   total heap usage: 927,255 allocs, 858,104 frees, 65,535,853 bytes allocated
==9270== 
==9270== Searching for pointers to 69,151 not-freed blocks
--9270--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9270--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9270--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9270--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9270--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9270--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9270--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9270--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9270--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9270--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9270--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9270--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9270--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9270--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9270--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9270--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9270--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9270--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9270--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9270--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9270--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9270--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9270--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9270--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9270--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9270--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9270--   Scanning root segment: 0x701a000..0x701afff (4096)
--9270--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9270--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9270--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9270--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9270--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9270--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9270--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9270--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9270--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9270== Checked 4,944,136 bytes
==9270== 
==9270== LEAK SUMMARY:
==9270==    definitely lost: 1,533 bytes in 8 blocks
==9270==    indirectly lost: 6,756 bytes in 7 blocks
==9270==      possibly lost: 0 bytes in 0 blocks
==9270==    still reachable: 3,155,416 bytes in 69,136 blocks
==9270==         suppressed: 0 bytes in 0 blocks
==9270== Rerun with --leak-check=full to see details of leaked memory
==9270== 
==9270== Use --track-origins=yes to see where uninitialised values come from
==9270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9270== 
==9270== 1 errors in context 1 of 2:
==9270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9270==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9270==    by 0x488CD0: stringsubst (subst.c:301)
==9270==    by 0x48801B: prefork (subst.c:77)
==9270==    by 0x42B318: execcmd (exec.c:2619)
==9270==    by 0x428CA0: execpline2 (exec.c:1697)
==9270==    by 0x427FD2: execpline (exec.c:1484)
==9270==    by 0x427756: execlist (exec.c:1267)
==9270==    by 0x42717C: execode (exec.c:1073)
==9270==    by 0x431299: runshfunc (exec.c:5040)
==9270==    by 0x430E76: doshfunc (exec.c:4920)
==9270==    by 0x4302FB: execshfunc (exec.c:4557)
==9270==    by 0x42D8C1: execcmd (exec.c:3373)
==9270== 
==9270== 
==9270== 2 errors in context 2 of 2:
==9270== Conditional jump or move depends on uninitialised value(s)
==9270==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9270==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9270==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9270==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9270==    by 0x42D8E9: execcmd (exec.c:3378)
==9270==    by 0x428CA0: execpline2 (exec.c:1697)
==9270==    by 0x427FD2: execpline (exec.c:1484)
==9270==    by 0x42779A: execlist (exec.c:1275)
==9270==    by 0x42717C: execode (exec.c:1073)
==9270==    by 0x431299: runshfunc (exec.c:5040)
==9270==    by 0x430E76: doshfunc (exec.c:4920)
==9270==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9270== 
==9270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9274-by-pythonnut-on-???
==9274== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9274-by-pythonnut-on-???
==9274== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9274-by-pythonnut-on-???
==9274== 
==9274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9274== don't want to do, unless you know exactly what you're doing,
==9274== or are doing some strange experiment):
==9274==   /usr/lib/valgrind/../../bin/vgdb --pid=9274 ...command...
==9274== 
==9274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9274==   /path/to/gdb ./zsh
==9274== and then give GDB the following command
==9274==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9274
==9274== --pid is optional if only one valgrind process is running
==9274== 
--9274-- Caught __NR_exit; running __libc_freeres()
==9273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9273-by-pythonnut-on-???
==9273== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9273-by-pythonnut-on-???
==9273== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9273-by-pythonnut-on-???
==9273== 
==9273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9273== don't want to do, unless you know exactly what you're doing,
==9273== or are doing some strange experiment):
==9273==   /usr/lib/valgrind/../../bin/vgdb --pid=9273 ...command...
==9273== 
==9273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9273==   /path/to/gdb ./zsh
==9273== and then give GDB the following command
==9273==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9273
==9273== --pid is optional if only one valgrind process is running
==9273== 
--9274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9274== 
==9274== HEAP SUMMARY:
==9274==     in use at exit: 3,164,390 bytes in 69,157 blocks
==9274==   total heap usage: 927,264 allocs, 858,107 frees, 65,503,298 bytes allocated
==9274== 
==9274== Searching for pointers to 69,157 not-freed blocks
--9274--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9274--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9274--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9274--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9274--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9274--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9274--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9274--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9274--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9274--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9274--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9274--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9274--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9274--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9274--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9274--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9274--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9274--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9274--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9274--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9274--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9274--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9274--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9274--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9274--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9274--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9274--   Scanning root segment: 0x701a000..0x701afff (4096)
--9274--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9274--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9274--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9274--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9274--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9274--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9274--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9274--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9274--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9274== Checked 4,908,312 bytes
==9274== 
==9274== LEAK SUMMARY:
==9274==    definitely lost: 1,533 bytes in 8 blocks
==9274==    indirectly lost: 6,756 bytes in 7 blocks
==9274==      possibly lost: 0 bytes in 0 blocks
==9274==    still reachable: 3,156,101 bytes in 69,142 blocks
==9274==         suppressed: 0 bytes in 0 blocks
==9274== Rerun with --leak-check=full to see details of leaked memory
==9274== 
==9274== Use --track-origins=yes to see where uninitialised values come from
==9274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9274== 
==9274== 1 errors in context 1 of 2:
==9274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9274==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9274==    by 0x488CD0: stringsubst (subst.c:301)
==9274==    by 0x48801B: prefork (subst.c:77)
==9274==    by 0x42B318: execcmd (exec.c:2619)
==9274==    by 0x428CA0: execpline2 (exec.c:1697)
==9274==    by 0x427FD2: execpline (exec.c:1484)
==9274==    by 0x427756: execlist (exec.c:1267)
==9274==    by 0x42717C: execode (exec.c:1073)
==9274==    by 0x431299: runshfunc (exec.c:5040)
==9274==    by 0x430E76: doshfunc (exec.c:4920)
==9274==    by 0x4302FB: execshfunc (exec.c:4557)
==9274==    by 0x42D8C1: execcmd (exec.c:3373)
==9274== 
==9274== 
==9274== 2 errors in context 2 of 2:
==9274== Conditional jump or move depends on uninitialised value(s)
==9274==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9274==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9274==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9274==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9274==    by 0x42D8E9: execcmd (exec.c:3378)
==9274==    by 0x428CA0: execpline2 (exec.c:1697)
==9274==    by 0x427FD2: execpline (exec.c:1484)
==9274==    by 0x42779A: execlist (exec.c:1275)
==9274==    by 0x42717C: execode (exec.c:1073)
==9274==    by 0x431299: runshfunc (exec.c:5040)
==9274==    by 0x430E76: doshfunc (exec.c:4920)
==9274==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9274== 
==9274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9273-- Caught __NR_exit; running __libc_freeres()
--9273-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9273== 
==9273== HEAP SUMMARY:
==9273==     in use at exit: 3,164,283 bytes in 69,157 blocks
==9273==   total heap usage: 927,301 allocs, 858,144 frees, 65,512,839 bytes allocated
==9273== 
==9273== Searching for pointers to 69,157 not-freed blocks
--9273--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9273--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9273--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9273--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9273--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9273--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9273--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9273--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9273--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9273--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9273--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9273--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9273--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9273--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9273--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9273--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9273--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9273--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9273--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9273--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9273--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9273--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9273--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9273--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9273--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9273--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9273--   Scanning root segment: 0x701a000..0x701afff (4096)
--9273--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9273--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9273--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9273--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9273--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9273--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9273--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9273--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9273--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9273== Checked 4,907,616 bytes
==9273== 
==9273== LEAK SUMMARY:
==9273==    definitely lost: 1,533 bytes in 8 blocks
==9273==    indirectly lost: 6,756 bytes in 7 blocks
==9273==      possibly lost: 0 bytes in 0 blocks
==9273==    still reachable: 3,155,994 bytes in 69,142 blocks
==9273==         suppressed: 0 bytes in 0 blocks
==9273== Rerun with --leak-check=full to see details of leaked memory
==9273== 
==9273== Use --track-origins=yes to see where uninitialised values come from
==9273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9273== 
==9273== 1 errors in context 1 of 2:
==9273== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9273==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9273==    by 0x488CD0: stringsubst (subst.c:301)
==9273==    by 0x48801B: prefork (subst.c:77)
==9273==    by 0x42B318: execcmd (exec.c:2619)
==9273==    by 0x428CA0: execpline2 (exec.c:1697)
==9273==    by 0x427FD2: execpline (exec.c:1484)
==9273==    by 0x427756: execlist (exec.c:1267)
==9273==    by 0x42717C: execode (exec.c:1073)
==9273==    by 0x431299: runshfunc (exec.c:5040)
==9273==    by 0x430E76: doshfunc (exec.c:4920)
==9273==    by 0x4302FB: execshfunc (exec.c:4557)
==9273==    by 0x42D8C1: execcmd (exec.c:3373)
==9273== 
==9273== 
==9273== 2 errors in context 2 of 2:
==9273== Conditional jump or move depends on uninitialised value(s)
==9273==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9273==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9273==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9273==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9273==    by 0x42D8E9: execcmd (exec.c:3378)
==9273==    by 0x428CA0: execpline2 (exec.c:1697)
==9273==    by 0x427FD2: execpline (exec.c:1484)
==9273==    by 0x42779A: execlist (exec.c:1275)
==9273==    by 0x42717C: execode (exec.c:1073)
==9273==    by 0x431299: runshfunc (exec.c:5040)
==9273==    by 0x430E76: doshfunc (exec.c:4920)
==9273==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9273== 
==9273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9275-by-pythonnut-on-???
==9275== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9275-by-pythonnut-on-???
==9275== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9275-by-pythonnut-on-???
==9275== 
==9275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9275== don't want to do, unless you know exactly what you're doing,
==9275== or are doing some strange experiment):
==9275==   /usr/lib/valgrind/../../bin/vgdb --pid=9275 ...command...
==9275== 
==9275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9275==   /path/to/gdb ./zsh
==9275== and then give GDB the following command
==9275==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9275
==9275== --pid is optional if only one valgrind process is running
==9275== 
--9275-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEAE9C,  len 4
--9275-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9276-- Caught __NR_exit; running __libc_freeres()
==9275== 
==9275== HEAP SUMMARY:
==9275==     in use at exit: 3,128,075 bytes in 69,157 blocks
==9275==   total heap usage: 927,273 allocs, 858,116 frees, 65,507,514 bytes allocated
==9275== 
==9276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9276-by-pythonnut-on-???
==9276== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9276-by-pythonnut-on-???
==9276== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9276-by-pythonnut-on-???
==9276== 
==9276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9276== don't want to do, unless you know exactly what you're doing,
==9276== or are doing some strange experiment):
==9276==   /usr/lib/valgrind/../../bin/vgdb --pid=9276 ...command...
==9276== 
==9276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9276==   /path/to/gdb ./zsh
==9276== and then give GDB the following command
==9276==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9276
==9276== --pid is optional if only one valgrind process is running
==9276== 
--9276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9275== Searching for pointers to 69,157 not-freed blocks
--9275--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9275--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9275--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9275--   Scanning root segment: 0x4037000..0x4043fff (53248)
==9276== 
--9275--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9275--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9275--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9275--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9275--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9275--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9275--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9275--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9275--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9275--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9275--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9275--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9275--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9275--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9275--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9275--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9275--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9275--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9275--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9275--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9275--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9275--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9275--   Scanning root segment: 0x701a000..0x701afff (4096)
--9275--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9275--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9275--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9275--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9275--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9275--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9275--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9275--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9275--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9276== HEAP SUMMARY:
==9276==     in use at exit: 3,127,819 bytes in 69,157 blocks
==9276==   total heap usage: 927,279 allocs, 858,122 frees, 65,509,634 bytes allocated
==9276== 
==9276== Searching for pointers to 69,157 not-freed blocks
--9276--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9276--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9276--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9276--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9276--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9276--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9276--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9276--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9276--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9276--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9276--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9276--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9276--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9276--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9276--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9276--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9276--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9276--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9276--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9276--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9276--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9276--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9276--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9276--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9276--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9276--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9276--   Scanning root segment: 0x701a000..0x701afff (4096)
--9276--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9276--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9276--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9276--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9276--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9276--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9276--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9276--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9276--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9275== Checked 4,870,984 bytes
==9275== 
==9275== LEAK SUMMARY:
==9275==    definitely lost: 1,533 bytes in 8 blocks
==9275==    indirectly lost: 6,756 bytes in 7 blocks
==9275==      possibly lost: 0 bytes in 0 blocks
==9275==    still reachable: 3,119,786 bytes in 69,142 blocks
==9275==         suppressed: 0 bytes in 0 blocks
==9275== Rerun with --leak-check=full to see details of leaked memory
==9275== 
==9275== Use --track-origins=yes to see where uninitialised values come from
==9275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9275== 
==9275== 1 errors in context 1 of 2:
==9275== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9275==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9275==    by 0x488CD0: stringsubst (subst.c:301)
==9275==    by 0x48801B: prefork (subst.c:77)
==9275==    by 0x42B318: execcmd (exec.c:2619)
==9275==    by 0x428CA0: execpline2 (exec.c:1697)
==9275==    by 0x427FD2: execpline (exec.c:1484)
==9275==    by 0x427756: execlist (exec.c:1267)
==9275==    by 0x42717C: execode (exec.c:1073)
==9275==    by 0x431299: runshfunc (exec.c:5040)
==9275==    by 0x430E76: doshfunc (exec.c:4920)
==9275==    by 0x4302FB: execshfunc (exec.c:4557)
==9275==    by 0x42D8C1: execcmd (exec.c:3373)
==9275== 
==9275== 
==9275== 2 errors in context 2 of 2:
==9275== Conditional jump or move depends on uninitialised value(s)
==9275==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9275==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9275==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9275==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9275==    by 0x42D8E9: execcmd (exec.c:3378)
==9275==    by 0x428CA0: execpline2 (exec.c:1697)
==9275==    by 0x427FD2: execpline (exec.c:1484)
==9275==    by 0x42779A: execlist (exec.c:1275)
==9275==    by 0x42717C: execode (exec.c:1073)
==9275==    by 0x431299: runshfunc (exec.c:5040)
==9275==    by 0x430E76: doshfunc (exec.c:4920)
==9275==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9275== 
==9275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9276== Checked 4,870,824 bytes
==9276== 
==9276== LEAK SUMMARY:
==9276==    definitely lost: 1,557 bytes in 9 blocks
==9276==    indirectly lost: 6,796 bytes in 9 blocks
==9276==      possibly lost: 0 bytes in 0 blocks
==9276==    still reachable: 3,119,466 bytes in 69,139 blocks
==9276==         suppressed: 0 bytes in 0 blocks
==9276== Rerun with --leak-check=full to see details of leaked memory
==9276== 
==9276== Use --track-origins=yes to see where uninitialised values come from
==9276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9276== 
==9276== 1 errors in context 1 of 2:
==9276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9276==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9276==    by 0x488CD0: stringsubst (subst.c:301)
==9276==    by 0x48801B: prefork (subst.c:77)
==9276==    by 0x42B318: execcmd (exec.c:2619)
==9276==    by 0x428CA0: execpline2 (exec.c:1697)
==9276==    by 0x427FD2: execpline (exec.c:1484)
==9276==    by 0x427756: execlist (exec.c:1267)
==9276==    by 0x42717C: execode (exec.c:1073)
==9276==    by 0x431299: runshfunc (exec.c:5040)
==9276==    by 0x430E76: doshfunc (exec.c:4920)
==9276==    by 0x4302FB: execshfunc (exec.c:4557)
==9276==    by 0x42D8C1: execcmd (exec.c:3373)
==9276== 
==9276== 
==9276== 2 errors in context 2 of 2:
==9276== Conditional jump or move depends on uninitialised value(s)
==9276==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9276==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9276==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9276==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9276==    by 0x42D8E9: execcmd (exec.c:3378)
==9276==    by 0x428CA0: execpline2 (exec.c:1697)
==9276==    by 0x427FD2: execpline (exec.c:1484)
==9276==    by 0x42779A: execlist (exec.c:1275)
==9276==    by 0x42717C: execode (exec.c:1073)
==9276==    by 0x431299: runshfunc (exec.c:5040)
==9276==    by 0x430E76: doshfunc (exec.c:4920)
==9276==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9276== 
==9276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9280== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9280-by-pythonnut-on-???
==9280== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9280-by-pythonnut-on-???
==9280== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9280-by-pythonnut-on-???
==9280== 
==9280== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9280== don't want to do, unless you know exactly what you're doing,
==9280== or are doing some strange experiment):
==9280==   /usr/lib/valgrind/../../bin/vgdb --pid=9280 ...command...
==9280== 
==9280== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9280==   /path/to/gdb ./zsh
==9280== and then give GDB the following command
==9280==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9280
==9280== --pid is optional if only one valgrind process is running
==9280== 
client request: code 4d430005,  addr 0xFFEFEB81C,  len 4
--9262-- Caught __NR_exit; running __libc_freeres()
--9262-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9262== 
==9262== HEAP SUMMARY:
==9262==     in use at exit: 3,126,377 bytes in 69,133 blocks
==9262==   total heap usage: 927,280 allocs, 858,147 frees, 65,510,202 bytes allocated
==9262== 
==9262== Searching for pointers to 69,133 not-freed blocks
--9262--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9262--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9262--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9262--   Scanning root segment: 0x4037000..0x403afff (16384)
--9262--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9262--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9262--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9262--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9262--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9262--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9262--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9262--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9262--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9262--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9262--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9262--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9262--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9262--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9262--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9262--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9262--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9262--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9262--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9262--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9262--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9262--   Scanning root segment: 0x701a000..0x701afff (4096)
--9262--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9262--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9262--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9262--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9262--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9262--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9262--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9262--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9262--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9262== Checked 4,793,592 bytes
==9262== 
==9262== LEAK SUMMARY:
==9262==    definitely lost: 1,533 bytes in 8 blocks
==9262==    indirectly lost: 6,756 bytes in 7 blocks
==9262==      possibly lost: 0 bytes in 0 blocks
==9262==    still reachable: 3,118,088 bytes in 69,118 blocks
==9262==         suppressed: 0 bytes in 0 blocks
==9262== Rerun with --leak-check=full to see details of leaked memory
==9262== 
==9262== Use --track-origins=yes to see where uninitialised values come from
==9262== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9262== 
==9262== 1 errors in context 1 of 2:
==9262== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9262==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9262==    by 0x488CD0: stringsubst (subst.c:301)
==9262==    by 0x48801B: prefork (subst.c:77)
==9262==    by 0x42B318: execcmd (exec.c:2619)
==9262==    by 0x428CA0: execpline2 (exec.c:1697)
==9262==    by 0x427FD2: execpline (exec.c:1484)
==9262==    by 0x427756: execlist (exec.c:1267)
==9262==    by 0x42717C: execode (exec.c:1073)
==9262==    by 0x431299: runshfunc (exec.c:5040)
==9262==    by 0x430E76: doshfunc (exec.c:4920)
==9262==    by 0x4302FB: execshfunc (exec.c:4557)
==9262==    by 0x42D8C1: execcmd (exec.c:3373)
==9262== 
==9262== 
==9262== 2 errors in context 2 of 2:
==9262== Conditional jump or move depends on uninitialised value(s)
==9262==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9262==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9262==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9262==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9262==    by 0x42D8E9: execcmd (exec.c:3378)
==9262==    by 0x428CA0: execpline2 (exec.c:1697)
==9262==    by 0x427FD2: execpline (exec.c:1484)
==9262==    by 0x42779A: execlist (exec.c:1275)
==9262==    by 0x42717C: execode (exec.c:1073)
==9262==    by 0x431299: runshfunc (exec.c:5040)
==9262==    by 0x430E76: doshfunc (exec.c:4920)
==9262==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9262== 
==9262== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9281-by-pythonnut-on-???
==9281== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9281-by-pythonnut-on-???
==9281== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9281-by-pythonnut-on-???
==9281== 
==9281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9281== don't want to do, unless you know exactly what you're doing,
==9281== or are doing some strange experiment):
==9281==   /usr/lib/valgrind/../../bin/vgdb --pid=9281 ...command...
==9281== 
==9281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9281==   /path/to/gdb ./zsh
==9281== and then give GDB the following command
==9281==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9281
==9281== --pid is optional if only one valgrind process is running
==9281== 
--9282-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEC14C,  len 4
==9282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9282-by-pythonnut-on-???
==9282== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9282-by-pythonnut-on-???
==9282== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9282-by-pythonnut-on-???
==9282== 
==9282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9282== don't want to do, unless you know exactly what you're doing,
==9282== or are doing some strange experiment):
==9282==   /usr/lib/valgrind/../../bin/vgdb --pid=9282 ...command...
==9282== 
==9282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9282==   /path/to/gdb ./zsh
==9282== and then give GDB the following command
==9282==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9282
==9282== --pid is optional if only one valgrind process is running
==9282== 
client request: code 4d430005,  addr 0xFFEFEC0AC,  len 4
--9282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9282== 
==9282== HEAP SUMMARY:
==9282==     in use at exit: 3,126,705 bytes in 69,134 blocks
==9282==   total heap usage: 927,223 allocs, 858,089 frees, 65,459,440 bytes allocated
==9282== 
==9282== Searching for pointers to 69,134 not-freed blocks
--9282--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9282--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9282--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9282--   Scanning root segment: 0x4037000..0x403afff (16384)
--9282--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9282--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9282--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9282--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9282--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9282--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9282--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9282--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9282--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9282--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9282--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9282--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9282--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9282--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9282--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9282--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9282--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9282--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9282--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9282--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9282--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9282--   Scanning root segment: 0x701a000..0x701afff (4096)
--9282--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9282--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9282--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9282--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9282--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9282--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9282--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9282--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9282--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9282== Checked 4,795,128 bytes
==9282== 
==9282== LEAK SUMMARY:
==9282==    definitely lost: 1,533 bytes in 8 blocks
==9282==    indirectly lost: 6,756 bytes in 7 blocks
==9282==      possibly lost: 0 bytes in 0 blocks
==9282==    still reachable: 3,118,416 bytes in 69,119 blocks
==9282==         suppressed: 0 bytes in 0 blocks
==9282== Rerun with --leak-check=full to see details of leaked memory
==9282== 
==9282== Use --track-origins=yes to see where uninitialised values come from
==9282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9282== 
==9282== 1 errors in context 1 of 2:
==9282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9282==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9282==    by 0x488CD0: stringsubst (subst.c:301)
==9282==    by 0x48801B: prefork (subst.c:77)
==9282==    by 0x42B318: execcmd (exec.c:2619)
==9282==    by 0x428CA0: execpline2 (exec.c:1697)
==9282==    by 0x427FD2: execpline (exec.c:1484)
==9282==    by 0x427756: execlist (exec.c:1267)
==9282==    by 0x42717C: execode (exec.c:1073)
==9282==    by 0x431299: runshfunc (exec.c:5040)
==9282==    by 0x430E76: doshfunc (exec.c:4920)
==9282==    by 0x4302FB: execshfunc (exec.c:4557)
==9282==    by 0x42D8C1: execcmd (exec.c:3373)
==9282== 
==9282== 
==9282== 2 errors in context 2 of 2:
==9282== Conditional jump or move depends on uninitialised value(s)
==9282==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9282==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9282==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9282==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9282==    by 0x42D8E9: execcmd (exec.c:3378)
==9282==    by 0x428CA0: execpline2 (exec.c:1697)
==9282==    by 0x427FD2: execpline (exec.c:1484)
==9282==    by 0x42779A: execlist (exec.c:1275)
==9282==    by 0x42717C: execode (exec.c:1073)
==9282==    by 0x431299: runshfunc (exec.c:5040)
==9282==    by 0x430E76: doshfunc (exec.c:4920)
==9282==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9282== 
==9282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9281-- Caught __NR_exit; running __libc_freeres()
--9281-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9281== 
==9281== HEAP SUMMARY:
==9281==     in use at exit: 3,126,417 bytes in 69,131 blocks
==9281==   total heap usage: 927,229 allocs, 858,098 frees, 65,460,328 bytes allocated
==9281== 
==9281== Searching for pointers to 69,131 not-freed blocks
--9281--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9281--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9281--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9281--   Scanning root segment: 0x4037000..0x403afff (16384)
--9281--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9281--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9281--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9281--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9281--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9281--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9281--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9281--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9281--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9281--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9281--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9281--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9281--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9281--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9281--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9281--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9281--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9281--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9281--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9281--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9281--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9281--   Scanning root segment: 0x701a000..0x701afff (4096)
--9281--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9281--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9281--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9281--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9281--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9281--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9281--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9281--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9281--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9281== Checked 4,794,208 bytes
==9281== 
==9281== LEAK SUMMARY:
==9281==    definitely lost: 1,533 bytes in 8 blocks
==9281==    indirectly lost: 6,756 bytes in 7 blocks
==9281==      possibly lost: 0 bytes in 0 blocks
==9281==    still reachable: 3,118,128 bytes in 69,116 blocks
==9281==         suppressed: 0 bytes in 0 blocks
==9281== Rerun with --leak-check=full to see details of leaked memory
==9281== 
==9281== Use --track-origins=yes to see where uninitialised values come from
==9281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9281== 
==9281== 1 errors in context 1 of 2:
==9281== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9281==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9281==    by 0x488CD0: stringsubst (subst.c:301)
==9281==    by 0x48801B: prefork (subst.c:77)
==9281==    by 0x42B318: execcmd (exec.c:2619)
==9281==    by 0x428CA0: execpline2 (exec.c:1697)
==9281==    by 0x427FD2: execpline (exec.c:1484)
==9281==    by 0x427756: execlist (exec.c:1267)
==9281==    by 0x42717C: execode (exec.c:1073)
==9281==    by 0x431299: runshfunc (exec.c:5040)
==9281==    by 0x430E76: doshfunc (exec.c:4920)
==9281==    by 0x4302FB: execshfunc (exec.c:4557)
==9281==    by 0x42D8C1: execcmd (exec.c:3373)
==9281== 
==9281== 
==9281== 2 errors in context 2 of 2:
==9281== Conditional jump or move depends on uninitialised value(s)
==9281==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9281==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9281==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9281==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9281==    by 0x42D8E9: execcmd (exec.c:3378)
==9281==    by 0x428CA0: execpline2 (exec.c:1697)
==9281==    by 0x427FD2: execpline (exec.c:1484)
==9281==    by 0x42779A: execlist (exec.c:1275)
==9281==    by 0x42717C: execode (exec.c:1073)
==9281==    by 0x431299: runshfunc (exec.c:5040)
==9281==    by 0x430E76: doshfunc (exec.c:4920)
==9281==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9281== 
==9281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9285== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9285-by-pythonnut-on-???
==9285== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9285-by-pythonnut-on-???
==9285== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9285-by-pythonnut-on-???
==9285== 
==9285== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9285== don't want to do, unless you know exactly what you're doing,
==9285== or are doing some strange experiment):
==9285==   /usr/lib/valgrind/../../bin/vgdb --pid=9285 ...command...
==9285== 
==9285== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9285==   /path/to/gdb ./zsh
==9285== and then give GDB the following command
==9285==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9285
==9285== --pid is optional if only one valgrind process is running
==9285== 
==9286== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9286-by-pythonnut-on-???
==9286== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9286-by-pythonnut-on-???
==9286== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9286-by-pythonnut-on-???
==9286== 
==9286== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9286== don't want to do, unless you know exactly what you're doing,
==9286== or are doing some strange experiment):
==9286==   /usr/lib/valgrind/../../bin/vgdb --pid=9286 ...command...
==9286== 
==9286== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9286==   /path/to/gdb ./zsh
==9286== and then give GDB the following command
==9286==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9286
==9286== --pid is optional if only one valgrind process is running
==9286== 
--9286-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEACEC,  len 4
client request: code 4d430005,  addr 0xFFEFEAC4C,  len 4
--9286-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9286== 
==9286== HEAP SUMMARY:
==9286==     in use at exit: 3,126,683 bytes in 69,137 blocks
==9286==   total heap usage: 927,257 allocs, 858,120 frees, 65,472,653 bytes allocated
==9286== 
==9286== Searching for pointers to 69,137 not-freed blocks
--9286--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9286--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9286--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9286--   Scanning root segment: 0x4037000..0x403afff (16384)
--9286--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9286--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9286--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9286--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9286--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9286--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9286--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9286--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9286--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9286--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9286--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9286--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9286--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9286--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9286--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9286--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9286--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9286--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9286--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9286--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9286--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9286--   Scanning root segment: 0x701a000..0x701afff (4096)
--9286--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9286--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9286--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9286--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9286--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9286--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9286--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9286--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9286--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9286== Checked 4,796,376 bytes
==9286== 
==9286== LEAK SUMMARY:
==9286==    definitely lost: 1,533 bytes in 8 blocks
==9286==    indirectly lost: 6,756 bytes in 7 blocks
==9286==      possibly lost: 0 bytes in 0 blocks
==9286==    still reachable: 3,118,394 bytes in 69,122 blocks
==9286==         suppressed: 0 bytes in 0 blocks
==9286== Rerun with --leak-check=full to see details of leaked memory
==9286== 
==9286== Use --track-origins=yes to see where uninitialised values come from
==9286== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9286== 
==9286== 1 errors in context 1 of 2:
==9286== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9286==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9286==    by 0x488CD0: stringsubst (subst.c:301)
==9286==    by 0x48801B: prefork (subst.c:77)
==9286==    by 0x42B318: execcmd (exec.c:2619)
==9286==    by 0x428CA0: execpline2 (exec.c:1697)
==9286==    by 0x427FD2: execpline (exec.c:1484)
==9286==    by 0x427756: execlist (exec.c:1267)
==9286==    by 0x42717C: execode (exec.c:1073)
==9286==    by 0x431299: runshfunc (exec.c:5040)
==9286==    by 0x430E76: doshfunc (exec.c:4920)
==9286==    by 0x4302FB: execshfunc (exec.c:4557)
==9286==    by 0x42D8C1: execcmd (exec.c:3373)
==9286== 
==9286== 
==9286== 2 errors in context 2 of 2:
==9286== Conditional jump or move depends on uninitialised value(s)
==9286==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9286==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9286==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9286==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9286==    by 0x42D8E9: execcmd (exec.c:3378)
==9286==    by 0x428CA0: execpline2 (exec.c:1697)
==9286==    by 0x427FD2: execpline (exec.c:1484)
==9286==    by 0x42779A: execlist (exec.c:1275)
==9286==    by 0x42717C: execode (exec.c:1073)
==9286==    by 0x431299: runshfunc (exec.c:5040)
==9286==    by 0x430E76: doshfunc (exec.c:4920)
==9286==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9286== 
==9286== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9285-- Caught __NR_exit; running __libc_freeres()
--9285-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9285== 
==9285== HEAP SUMMARY:
==9285==     in use at exit: 3,126,688 bytes in 69,138 blocks
==9285==   total heap usage: 927,253 allocs, 858,115 frees, 65,469,069 bytes allocated
==9285== 
==9285== Searching for pointers to 69,138 not-freed blocks
--9285--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9285--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9285--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9285--   Scanning root segment: 0x4037000..0x403afff (16384)
--9285--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9285--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9285--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9285--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9285--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9285--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9285--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9285--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9285--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9285--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9285--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9285--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9285--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9285--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9285--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9285--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9285--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9285--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9285--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9285--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9285--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9285--   Scanning root segment: 0x701a000..0x701afff (4096)
--9285--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9285--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9285--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9285--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9285--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9285--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9285--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9285--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9285--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9285== Checked 4,796,072 bytes
==9285== 
==9285== LEAK SUMMARY:
==9285==    definitely lost: 1,533 bytes in 8 blocks
==9285==    indirectly lost: 6,756 bytes in 7 blocks
==9285==      possibly lost: 0 bytes in 0 blocks
==9285==    still reachable: 3,118,399 bytes in 69,123 blocks
==9285==         suppressed: 0 bytes in 0 blocks
==9285== Rerun with --leak-check=full to see details of leaked memory
==9285== 
==9285== Use --track-origins=yes to see where uninitialised values come from
==9285== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9285== 
==9285== 1 errors in context 1 of 2:
==9285== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9285==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9285==    by 0x488CD0: stringsubst (subst.c:301)
==9285==    by 0x48801B: prefork (subst.c:77)
==9285==    by 0x42B318: execcmd (exec.c:2619)
==9285==    by 0x428CA0: execpline2 (exec.c:1697)
==9285==    by 0x427FD2: execpline (exec.c:1484)
==9285==    by 0x427756: execlist (exec.c:1267)
==9285==    by 0x42717C: execode (exec.c:1073)
==9285==    by 0x431299: runshfunc (exec.c:5040)
==9285==    by 0x430E76: doshfunc (exec.c:4920)
==9285==    by 0x4302FB: execshfunc (exec.c:4557)
==9285==    by 0x42D8C1: execcmd (exec.c:3373)
==9285== 
==9285== 
==9285== 2 errors in context 2 of 2:
==9285== Conditional jump or move depends on uninitialised value(s)
==9285==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9285==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9285==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9285==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9285==    by 0x42D8E9: execcmd (exec.c:3378)
==9285==    by 0x428CA0: execpline2 (exec.c:1697)
==9285==    by 0x427FD2: execpline (exec.c:1484)
==9285==    by 0x42779A: execlist (exec.c:1275)
==9285==    by 0x42717C: execode (exec.c:1073)
==9285==    by 0x431299: runshfunc (exec.c:5040)
==9285==    by 0x430E76: doshfunc (exec.c:4920)
==9285==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9285== 
==9285== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEB23C,  len 4
--9289-- Caught __NR_exit; running __libc_freeres()
==9289== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9289-by-pythonnut-on-???
==9289== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9289-by-pythonnut-on-???
==9289== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9289-by-pythonnut-on-???
==9289== 
==9289== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9289== don't want to do, unless you know exactly what you're doing,
==9289== or are doing some strange experiment):
==9289==   /usr/lib/valgrind/../../bin/vgdb --pid=9289 ...command...
==9289== 
==9289== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9289==   /path/to/gdb ./zsh
==9289== and then give GDB the following command
==9289==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9289
==9289== --pid is optional if only one valgrind process is running
==9289== 
--9289-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9289== 
==9289== HEAP SUMMARY:
==9289==     in use at exit: 3,127,032 bytes in 69,143 blocks
==9289==   total heap usage: 927,264 allocs, 858,121 frees, 65,474,299 bytes allocated
==9289== 
==9289== Searching for pointers to 69,143 not-freed blocks
--9289--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9289--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9289--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9289--   Scanning root segment: 0x4037000..0x403afff (16384)
--9289--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9289--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9289--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9289--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9289--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9289--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9289--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9289--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9289--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9289--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9289--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9289--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9289--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9289--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9289--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9289--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9289--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9289--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9289--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9289--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9289--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9289--   Scanning root segment: 0x701a000..0x701afff (4096)
--9289--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9289--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9289--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9289--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9289--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9289--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9289--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9289--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9289--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9289== Checked 4,796,136 bytes
==9289== 
==9289== LEAK SUMMARY:
==9289==    definitely lost: 1,533 bytes in 8 blocks
==9289==    indirectly lost: 6,756 bytes in 7 blocks
==9289==      possibly lost: 0 bytes in 0 blocks
==9289==    still reachable: 3,118,743 bytes in 69,128 blocks
==9289==         suppressed: 0 bytes in 0 blocks
==9289== Rerun with --leak-check=full to see details of leaked memory
==9289== 
==9289== Use --track-origins=yes to see where uninitialised values come from
==9289== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9289== 
==9289== 1 errors in context 1 of 2:
==9289== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9289==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9289==    by 0x488CD0: stringsubst (subst.c:301)
==9289==    by 0x48801B: prefork (subst.c:77)
==9289==    by 0x42B318: execcmd (exec.c:2619)
==9289==    by 0x428CA0: execpline2 (exec.c:1697)
==9289==    by 0x427FD2: execpline (exec.c:1484)
==9289==    by 0x427756: execlist (exec.c:1267)
==9289==    by 0x42717C: execode (exec.c:1073)
==9289==    by 0x431299: runshfunc (exec.c:5040)
==9289==    by 0x430E76: doshfunc (exec.c:4920)
==9289==    by 0x4302FB: execshfunc (exec.c:4557)
==9289==    by 0x42D8C1: execcmd (exec.c:3373)
==9289== 
==9289== 
==9289== 2 errors in context 2 of 2:
==9289== Conditional jump or move depends on uninitialised value(s)
==9289==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9289==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9289==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9289==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9289==    by 0x42D8E9: execcmd (exec.c:3378)
==9289==    by 0x428CA0: execpline2 (exec.c:1697)
==9289==    by 0x427FD2: execpline (exec.c:1484)
==9289==    by 0x42779A: execlist (exec.c:1275)
==9289==    by 0x42717C: execode (exec.c:1073)
==9289==    by 0x431299: runshfunc (exec.c:5040)
==9289==    by 0x430E76: doshfunc (exec.c:4920)
==9289==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9289== 
==9289== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEAD8C,  len 4
--9293-- Caught __NR_exit; running __libc_freeres()
==9293== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9293-by-pythonnut-on-???
==9293== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9293-by-pythonnut-on-???
==9293== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9293-by-pythonnut-on-???
==9293== 
==9293== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9293== don't want to do, unless you know exactly what you're doing,
==9293== or are doing some strange experiment):
==9293==   /usr/lib/valgrind/../../bin/vgdb --pid=9293 ...command...
==9293== 
==9293== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9293==   /path/to/gdb ./zsh
==9293== and then give GDB the following command
==9293==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9293
==9293== --pid is optional if only one valgrind process is running
==9293== 
--9293-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9293== 
==9293== HEAP SUMMARY:
==9293==     in use at exit: 3,127,061 bytes in 69,144 blocks
==9293==   total heap usage: 927,269 allocs, 858,125 frees, 65,476,440 bytes allocated
==9293== 
==9293== Searching for pointers to 69,144 not-freed blocks
--9293--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9293--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9293--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9293--   Scanning root segment: 0x4037000..0x403afff (16384)
--9293--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9293--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9293--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9293--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9293--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9293--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9293--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9293--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9293--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9293--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9293--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9293--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9293--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9293--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9293--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9293--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9293--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9293--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9293--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9293--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9293--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9293--   Scanning root segment: 0x701a000..0x701afff (4096)
--9293--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9293--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9293--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9293--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9293--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9293--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9293--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9293--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9293--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9293== Checked 4,796,432 bytes
==9293== 
==9293== LEAK SUMMARY:
==9293==    definitely lost: 1,533 bytes in 8 blocks
==9293==    indirectly lost: 6,756 bytes in 7 blocks
==9293==      possibly lost: 0 bytes in 0 blocks
==9293==    still reachable: 3,118,772 bytes in 69,129 blocks
==9293==         suppressed: 0 bytes in 0 blocks
==9293== Rerun with --leak-check=full to see details of leaked memory
==9293== 
==9293== Use --track-origins=yes to see where uninitialised values come from
==9293== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9293== 
==9293== 1 errors in context 1 of 2:
==9293== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9293==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9293==    by 0x488CD0: stringsubst (subst.c:301)
==9293==    by 0x48801B: prefork (subst.c:77)
==9293==    by 0x42B318: execcmd (exec.c:2619)
==9293==    by 0x428CA0: execpline2 (exec.c:1697)
==9293==    by 0x427FD2: execpline (exec.c:1484)
==9293==    by 0x427756: execlist (exec.c:1267)
==9293==    by 0x42717C: execode (exec.c:1073)
==9293==    by 0x431299: runshfunc (exec.c:5040)
==9293==    by 0x430E76: doshfunc (exec.c:4920)
==9293==    by 0x4302FB: execshfunc (exec.c:4557)
==9293==    by 0x42D8C1: execcmd (exec.c:3373)
==9293== 
==9293== 
==9293== 2 errors in context 2 of 2:
==9293== Conditional jump or move depends on uninitialised value(s)
==9293==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9293==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9293==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9293==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9293==    by 0x42D8E9: execcmd (exec.c:3378)
==9293==    by 0x428CA0: execpline2 (exec.c:1697)
==9293==    by 0x427FD2: execpline (exec.c:1484)
==9293==    by 0x42779A: execlist (exec.c:1275)
==9293==    by 0x42717C: execode (exec.c:1073)
==9293==    by 0x431299: runshfunc (exec.c:5040)
==9293==    by 0x430E76: doshfunc (exec.c:4920)
==9293==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9293== 
==9293== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEB70C,  len 4
client request: code 4d430005,  addr 0xFFEFEB08C,  len 4
--9261-- Caught __NR_exit; running __libc_freeres()
--9261-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9261== 
==9261== HEAP SUMMARY:
==9261==     in use at exit: 3,125,013 bytes in 69,094 blocks
==9261==   total heap usage: 927,278 allocs, 858,184 frees, 65,480,380 bytes allocated
==9261== 
==9261== Searching for pointers to 69,094 not-freed blocks
--9261--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9261--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9261--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9261--   Scanning root segment: 0x4037000..0x403afff (16384)
--9261--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9261--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9261--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9261--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9261--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9261--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9261--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9261--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9261--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9261--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9261--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9261--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9261--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9261--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9261--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9261--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9261--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9261--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9261--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9261--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9261--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9261--   Scanning root segment: 0x701a000..0x701afff (4096)
--9261--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9261--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9261--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9261--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9261--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9261--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9261--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9261--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9261--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9261== Checked 4,790,488 bytes
==9261== 
==9261== LEAK SUMMARY:
==9261==    definitely lost: 1,533 bytes in 8 blocks
==9261==    indirectly lost: 6,756 bytes in 7 blocks
==9261==      possibly lost: 0 bytes in 0 blocks
==9261==    still reachable: 3,116,724 bytes in 69,079 blocks
==9261==         suppressed: 0 bytes in 0 blocks
==9261== Rerun with --leak-check=full to see details of leaked memory
==9261== 
==9261== Use --track-origins=yes to see where uninitialised values come from
==9261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9261== 
==9261== 1 errors in context 1 of 2:
==9261== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9261==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9261==    by 0x488CD0: stringsubst (subst.c:301)
==9261==    by 0x48801B: prefork (subst.c:77)
==9261==    by 0x42B318: execcmd (exec.c:2619)
==9261==    by 0x428CA0: execpline2 (exec.c:1697)
==9261==    by 0x427FD2: execpline (exec.c:1484)
==9261==    by 0x427756: execlist (exec.c:1267)
==9261==    by 0x42717C: execode (exec.c:1073)
==9261==    by 0x431299: runshfunc (exec.c:5040)
==9261==    by 0x430E76: doshfunc (exec.c:4920)
==9261==    by 0x4302FB: execshfunc (exec.c:4557)
==9261==    by 0x42D8C1: execcmd (exec.c:3373)
==9261== 
==9261== 
==9261== 2 errors in context 2 of 2:
==9261== Conditional jump or move depends on uninitialised value(s)
==9261==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9261==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9261==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9261==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9261==    by 0x42D8E9: execcmd (exec.c:3378)
==9261==    by 0x428CA0: execpline2 (exec.c:1697)
==9261==    by 0x427FD2: execpline (exec.c:1484)
==9261==    by 0x42779A: execlist (exec.c:1275)
==9261==    by 0x42717C: execode (exec.c:1073)
==9261==    by 0x431299: runshfunc (exec.c:5040)
==9261==    by 0x430E76: doshfunc (exec.c:4920)
==9261==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9261== 
==9261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9297== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9297-by-pythonnut-on-???
==9297== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9297-by-pythonnut-on-???
==9297== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9297-by-pythonnut-on-???
==9297== 
==9297== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9297== don't want to do, unless you know exactly what you're doing,
==9297== or are doing some strange experiment):
==9297==   /usr/lib/valgrind/../../bin/vgdb --pid=9297 ...command...
==9297== 
==9297== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9297==   /path/to/gdb ./zsh
==9297== and then give GDB the following command
==9297==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9297
==9297== --pid is optional if only one valgrind process is running
==9297== 
--9297-- Caught __NR_exit; running __libc_freeres()
--9297-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9297== 
==9297== HEAP SUMMARY:
==9297==     in use at exit: 3,130,729 bytes in 69,276 blocks
==9297==   total heap usage: 927,394 allocs, 858,118 frees, 65,446,267 bytes allocated
==9297== 
==9297== Searching for pointers to 69,276 not-freed blocks
--9297--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9297--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9297--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9297--   Scanning root segment: 0x4037000..0x403afff (16384)
--9297--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9297--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9297--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9297--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9297--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9297--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9297--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9297--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9297--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9297--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9297--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9297--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9297--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9297--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9297--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9297--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9297--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9297--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9297--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9297--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9297--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9297--   Scanning root segment: 0x701a000..0x701afff (4096)
--9297--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9297--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9297--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9297--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9297--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9297--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9297--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9297--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9297--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9297== Checked 4,802,320 bytes
==9297== 
==9297== LEAK SUMMARY:
==9297==    definitely lost: 1,533 bytes in 8 blocks
==9297==    indirectly lost: 6,756 bytes in 7 blocks
==9297==      possibly lost: 0 bytes in 0 blocks
==9297==    still reachable: 3,122,440 bytes in 69,261 blocks
==9297==         suppressed: 0 bytes in 0 blocks
==9297== Rerun with --leak-check=full to see details of leaked memory
==9297== 
==9297== Use --track-origins=yes to see where uninitialised values come from
==9297== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9297== 
==9297== 1 errors in context 1 of 2:
==9297== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9297==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9297==    by 0x488CD0: stringsubst (subst.c:301)
==9297==    by 0x48801B: prefork (subst.c:77)
==9297==    by 0x42B318: execcmd (exec.c:2619)
==9297==    by 0x428CA0: execpline2 (exec.c:1697)
==9297==    by 0x427FD2: execpline (exec.c:1484)
==9297==    by 0x427756: execlist (exec.c:1267)
==9297==    by 0x42717C: execode (exec.c:1073)
==9297==    by 0x431299: runshfunc (exec.c:5040)
==9297==    by 0x430E76: doshfunc (exec.c:4920)
==9297==    by 0x4302FB: execshfunc (exec.c:4557)
==9297==    by 0x42D8C1: execcmd (exec.c:3373)
==9297== 
==9297== 
==9297== 2 errors in context 2 of 2:
==9297== Conditional jump or move depends on uninitialised value(s)
==9297==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9297==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9297==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9297==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9297==    by 0x42D8E9: execcmd (exec.c:3378)
==9297==    by 0x428CA0: execpline2 (exec.c:1697)
==9297==    by 0x427FD2: execpline (exec.c:1484)
==9297==    by 0x42779A: execlist (exec.c:1275)
==9297==    by 0x42717C: execode (exec.c:1073)
==9297==    by 0x431299: runshfunc (exec.c:5040)
==9297==    by 0x430E76: doshfunc (exec.c:4920)
==9297==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9297== 
==9297== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9298== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9298-by-pythonnut-on-???
==9298== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9298-by-pythonnut-on-???
==9298== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9298-by-pythonnut-on-???
==9298== 
==9298== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9298== don't want to do, unless you know exactly what you're doing,
==9298== or are doing some strange experiment):
==9298==   /usr/lib/valgrind/../../bin/vgdb --pid=9298 ...command...
==9298== 
==9298== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9298==   /path/to/gdb ./zsh
==9298== and then give GDB the following command
==9298==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9298
==9298== --pid is optional if only one valgrind process is running
==9298== 
--9298-- Caught __NR_exit; running __libc_freeres()
--9298-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9298== 
==9298== HEAP SUMMARY:
==9298==     in use at exit: 3,130,873 bytes in 69,276 blocks
==9298==   total heap usage: 927,402 allocs, 858,126 frees, 65,449,323 bytes allocated
==9298== 
==9298== Searching for pointers to 69,276 not-freed blocks
--9298--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9298--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9298--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9298--   Scanning root segment: 0x4037000..0x403afff (16384)
--9298--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9298--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9298--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9298--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9298--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9298--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9298--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9298--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9298--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9298--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9298--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9298--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9298--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9298--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9298--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9298--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9298--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9298--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9298--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9298--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9298--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9298--   Scanning root segment: 0x701a000..0x701afff (4096)
--9298--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9298--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9298--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9298--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9298--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9298--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9298--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9298--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9298--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9298== Checked 4,803,816 bytes
==9298== 
==9298== LEAK SUMMARY:
==9298==    definitely lost: 1,533 bytes in 8 blocks
==9298==    indirectly lost: 6,756 bytes in 7 blocks
==9298==      possibly lost: 0 bytes in 0 blocks
==9298==    still reachable: 3,122,584 bytes in 69,261 blocks
==9298==         suppressed: 0 bytes in 0 blocks
==9298== Rerun with --leak-check=full to see details of leaked memory
==9298== 
==9298== Use --track-origins=yes to see where uninitialised values come from
==9298== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9298== 
==9298== 1 errors in context 1 of 2:
==9298== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9298==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9298==    by 0x488CD0: stringsubst (subst.c:301)
==9298==    by 0x48801B: prefork (subst.c:77)
==9298==    by 0x42B318: execcmd (exec.c:2619)
==9298==    by 0x428CA0: execpline2 (exec.c:1697)
==9298==    by 0x427FD2: execpline (exec.c:1484)
==9298==    by 0x427756: execlist (exec.c:1267)
==9298==    by 0x42717C: execode (exec.c:1073)
==9298==    by 0x431299: runshfunc (exec.c:5040)
==9298==    by 0x430E76: doshfunc (exec.c:4920)
==9298==    by 0x4302FB: execshfunc (exec.c:4557)
==9298==    by 0x42D8C1: execcmd (exec.c:3373)
==9298== 
==9298== 
==9298== 2 errors in context 2 of 2:
==9298== Conditional jump or move depends on uninitialised value(s)
==9298==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9298==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9298==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9298==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9298==    by 0x42D8E9: execcmd (exec.c:3378)
==9298==    by 0x428CA0: execpline2 (exec.c:1697)
==9298==    by 0x427FD2: execpline (exec.c:1484)
==9298==    by 0x42779A: execlist (exec.c:1275)
==9298==    by 0x42717C: execode (exec.c:1073)
==9298==    by 0x431299: runshfunc (exec.c:5040)
==9298==    by 0x430E76: doshfunc (exec.c:4920)
==9298==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9298== 
==9298== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9299== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9299-by-pythonnut-on-???
==9299== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9299-by-pythonnut-on-???
==9299== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9299-by-pythonnut-on-???
==9299== 
==9299== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9299== don't want to do, unless you know exactly what you're doing,
==9299== or are doing some strange experiment):
==9299==   /usr/lib/valgrind/../../bin/vgdb --pid=9299 ...command...
==9299== 
==9299== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9299==   /path/to/gdb ./zsh
==9299== and then give GDB the following command
==9299==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9299
==9299== --pid is optional if only one valgrind process is running
==9299== 
--9299-- Caught __NR_exit; running __libc_freeres()
--9299-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9299== 
==9299== HEAP SUMMARY:
==9299==     in use at exit: 3,130,749 bytes in 69,276 blocks
==9299==   total heap usage: 927,898 allocs, 858,622 frees, 65,491,670 bytes allocated
==9299== 
==9299== Searching for pointers to 69,276 not-freed blocks
--9299--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9299--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9299--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9299--   Scanning root segment: 0x4037000..0x403afff (16384)
--9299--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9299--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9299--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9299--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9299--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9299--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9299--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9299--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9299--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9299--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9299--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9299--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9299--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9299--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9299--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9299--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9299--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9299--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9299--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9299--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9299--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9299--   Scanning root segment: 0x701a000..0x701afff (4096)
--9299--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9299--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9299--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9299--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9299--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9299--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9299--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9299--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9299--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9299== Checked 4,802,336 bytes
==9299== 
==9299== LEAK SUMMARY:
==9299==    definitely lost: 1,533 bytes in 8 blocks
==9299==    indirectly lost: 6,756 bytes in 7 blocks
==9299==      possibly lost: 0 bytes in 0 blocks
==9299==    still reachable: 3,122,460 bytes in 69,261 blocks
==9299==         suppressed: 0 bytes in 0 blocks
==9299== Rerun with --leak-check=full to see details of leaked memory
==9299== 
==9299== Use --track-origins=yes to see where uninitialised values come from
==9299== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9299== 
==9299== 1 errors in context 1 of 2:
==9299== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9299==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9299==    by 0x488CD0: stringsubst (subst.c:301)
==9299==    by 0x48801B: prefork (subst.c:77)
==9299==    by 0x42B318: execcmd (exec.c:2619)
==9299==    by 0x428CA0: execpline2 (exec.c:1697)
==9299==    by 0x427FD2: execpline (exec.c:1484)
==9299==    by 0x427756: execlist (exec.c:1267)
==9299==    by 0x42717C: execode (exec.c:1073)
==9299==    by 0x431299: runshfunc (exec.c:5040)
==9299==    by 0x430E76: doshfunc (exec.c:4920)
==9299==    by 0x4302FB: execshfunc (exec.c:4557)
==9299==    by 0x42D8C1: execcmd (exec.c:3373)
==9299== 
==9299== 
==9299== 2 errors in context 2 of 2:
==9299== Conditional jump or move depends on uninitialised value(s)
==9299==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9299==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9299==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9299==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9299==    by 0x42D8E9: execcmd (exec.c:3378)
==9299==    by 0x428CA0: execpline2 (exec.c:1697)
==9299==    by 0x427FD2: execpline (exec.c:1484)
==9299==    by 0x42779A: execlist (exec.c:1275)
==9299==    by 0x42717C: execode (exec.c:1073)
==9299==    by 0x431299: runshfunc (exec.c:5040)
==9299==    by 0x430E76: doshfunc (exec.c:4920)
==9299==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9299== 
==9299== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9300== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9300-by-pythonnut-on-???
==9300== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9300-by-pythonnut-on-???
==9300== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9300-by-pythonnut-on-???
==9300== 
==9300== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9300== don't want to do, unless you know exactly what you're doing,
==9300== or are doing some strange experiment):
==9300==   /usr/lib/valgrind/../../bin/vgdb --pid=9300 ...command...
==9300== 
==9300== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9300==   /path/to/gdb ./zsh
==9300== and then give GDB the following command
==9300==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9300
==9300== --pid is optional if only one valgrind process is running
==9300== 
--9300-- Caught __NR_exit; running __libc_freeres()
--9300-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9300== 
==9300== HEAP SUMMARY:
==9300==     in use at exit: 3,130,892 bytes in 69,276 blocks
==9300==   total heap usage: 927,906 allocs, 858,630 frees, 65,494,726 bytes allocated
==9300== 
==9300== Searching for pointers to 69,276 not-freed blocks
--9300--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9300--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9300--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9300--   Scanning root segment: 0x4037000..0x403afff (16384)
--9300--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9300--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9300--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9300--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9300--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9300--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9300--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9300--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9300--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9300--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9300--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9300--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9300--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9300--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9300--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9300--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9300--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9300--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9300--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9300--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9300--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9300--   Scanning root segment: 0x701a000..0x701afff (4096)
--9300--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9300--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9300--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9300--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9300--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9300--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9300--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9300--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9300--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9300== Checked 4,803,832 bytes
==9300== 
==9300== LEAK SUMMARY:
==9300==    definitely lost: 1,533 bytes in 8 blocks
==9300==    indirectly lost: 6,756 bytes in 7 blocks
==9300==      possibly lost: 0 bytes in 0 blocks
==9300==    still reachable: 3,122,603 bytes in 69,261 blocks
==9300==         suppressed: 0 bytes in 0 blocks
==9300== Rerun with --leak-check=full to see details of leaked memory
==9300== 
==9300== Use --track-origins=yes to see where uninitialised values come from
==9300== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9300== 
==9300== 1 errors in context 1 of 2:
==9300== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9300==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9300==    by 0x488CD0: stringsubst (subst.c:301)
==9300==    by 0x48801B: prefork (subst.c:77)
==9300==    by 0x42B318: execcmd (exec.c:2619)
==9300==    by 0x428CA0: execpline2 (exec.c:1697)
==9300==    by 0x427FD2: execpline (exec.c:1484)
==9300==    by 0x427756: execlist (exec.c:1267)
==9300==    by 0x42717C: execode (exec.c:1073)
==9300==    by 0x431299: runshfunc (exec.c:5040)
==9300==    by 0x430E76: doshfunc (exec.c:4920)
==9300==    by 0x4302FB: execshfunc (exec.c:4557)
==9300==    by 0x42D8C1: execcmd (exec.c:3373)
==9300== 
==9300== 
==9300== 2 errors in context 2 of 2:
==9300== Conditional jump or move depends on uninitialised value(s)
==9300==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9300==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9300==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9300==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9300==    by 0x42D8E9: execcmd (exec.c:3378)
==9300==    by 0x428CA0: execpline2 (exec.c:1697)
==9300==    by 0x427FD2: execpline (exec.c:1484)
==9300==    by 0x42779A: execlist (exec.c:1275)
==9300==    by 0x42717C: execode (exec.c:1073)
==9300==    by 0x431299: runshfunc (exec.c:5040)
==9300==    by 0x430E76: doshfunc (exec.c:4920)
==9300==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9300== 
==9300== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9303== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9303-by-pythonnut-on-???
==9303== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9303-by-pythonnut-on-???
==9303== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9303-by-pythonnut-on-???
==9303== 
==9303== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9303== don't want to do, unless you know exactly what you're doing,
==9303== or are doing some strange experiment):
==9303==   /usr/lib/valgrind/../../bin/vgdb --pid=9303 ...command...
==9303== 
==9303== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9303==   /path/to/gdb ./zsh
==9303== and then give GDB the following command
==9303==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9303
==9303== --pid is optional if only one valgrind process is running
==9303== 
--9304-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==9304== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9304-by-pythonnut-on-???
==9304== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9304-by-pythonnut-on-???
==9304== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9304-by-pythonnut-on-???
==9304== 
==9304== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9304== don't want to do, unless you know exactly what you're doing,
==9304== or are doing some strange experiment):
==9304==   /usr/lib/valgrind/../../bin/vgdb --pid=9304 ...command...
==9304== 
==9304== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9304==   /path/to/gdb ./zsh
==9304== and then give GDB the following command
==9304==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9304
==9304== --pid is optional if only one valgrind process is running
==9304== 
--9304-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9304== 
==9304== HEAP SUMMARY:
==9304==     in use at exit: 3,111,044 bytes in 68,842 blocks
==9304==   total heap usage: 928,186 allocs, 859,344 frees, 65,531,250 bytes allocated
==9304== 
==9304== Searching for pointers to 68,842 not-freed blocks
--9304--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9304--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9304--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9304--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9304--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9304--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9304--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9304--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9304--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9304--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9304--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9304--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9304--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9304--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9304--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9304--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9304--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9304--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9304--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9304--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9304--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9304--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9304--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9304--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9304--   Scanning root segment: 0x701a000..0x701afff (4096)
--9304--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9304--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9304--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9304--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9304--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9304--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9304--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9304--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9304--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9304== Checked 4,754,112 bytes
==9304== 
==9304== LEAK SUMMARY:
==9304==    definitely lost: 1,533 bytes in 8 blocks
==9304==    indirectly lost: 6,756 bytes in 7 blocks
==9304==      possibly lost: 0 bytes in 0 blocks
==9304==    still reachable: 3,102,755 bytes in 68,827 blocks
==9304==         suppressed: 0 bytes in 0 blocks
==9304== Rerun with --leak-check=full to see details of leaked memory
==9304== 
==9304== Use --track-origins=yes to see where uninitialised values come from
==9304== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9304== 
==9304== 1 errors in context 1 of 2:
==9304== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9304==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9304==    by 0x488CD0: stringsubst (subst.c:301)
==9304==    by 0x48801B: prefork (subst.c:77)
==9304==    by 0x42B318: execcmd (exec.c:2619)
==9304==    by 0x428CA0: execpline2 (exec.c:1697)
==9304==    by 0x427FD2: execpline (exec.c:1484)
==9304==    by 0x427756: execlist (exec.c:1267)
==9304==    by 0x42717C: execode (exec.c:1073)
==9304==    by 0x431299: runshfunc (exec.c:5040)
==9304==    by 0x430E76: doshfunc (exec.c:4920)
==9304==    by 0x4302FB: execshfunc (exec.c:4557)
==9304==    by 0x42D8C1: execcmd (exec.c:3373)
==9304== 
==9304== 
==9304== 2 errors in context 2 of 2:
==9304== Conditional jump or move depends on uninitialised value(s)
==9304==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9304==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9304==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9304==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9304==    by 0x42D8E9: execcmd (exec.c:3378)
==9304==    by 0x428CA0: execpline2 (exec.c:1697)
==9304==    by 0x427FD2: execpline (exec.c:1484)
==9304==    by 0x42779A: execlist (exec.c:1275)
==9304==    by 0x42717C: execode (exec.c:1073)
==9304==    by 0x431299: runshfunc (exec.c:5040)
==9304==    by 0x430E76: doshfunc (exec.c:4920)
==9304==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9304== 
==9304== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9303-- Caught __NR_exit; running __libc_freeres()
--9303-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9303== 
==9303== HEAP SUMMARY:
==9303==     in use at exit: 3,110,685 bytes in 68,832 blocks
==9303==   total heap usage: 928,189 allocs, 859,357 frees, 65,531,890 bytes allocated
==9303== 
==9303== Searching for pointers to 68,832 not-freed blocks
--9303--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9303--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9303--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9303--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9303--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9303--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9303--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9303--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9303--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9303--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9303--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9303--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9303--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9303--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9303--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9303--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9303--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9303--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9303--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9303--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9303--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9303--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9303--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9303--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9303--   Scanning root segment: 0x701a000..0x701afff (4096)
--9303--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9303--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9303--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9303--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9303--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9303--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9303--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9303--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9303--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9303== Checked 4,751,792 bytes
==9303== 
==9303== LEAK SUMMARY:
==9303==    definitely lost: 1,533 bytes in 8 blocks
==9303==    indirectly lost: 6,756 bytes in 7 blocks
==9303==      possibly lost: 0 bytes in 0 blocks
==9303==    still reachable: 3,102,396 bytes in 68,817 blocks
==9303==         suppressed: 0 bytes in 0 blocks
==9303== Rerun with --leak-check=full to see details of leaked memory
==9303== 
==9303== Use --track-origins=yes to see where uninitialised values come from
==9303== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9303== 
==9303== 1 errors in context 1 of 2:
==9303== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9303==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9303==    by 0x488CD0: stringsubst (subst.c:301)
==9303==    by 0x48801B: prefork (subst.c:77)
==9303==    by 0x42B318: execcmd (exec.c:2619)
==9303==    by 0x428CA0: execpline2 (exec.c:1697)
==9303==    by 0x427FD2: execpline (exec.c:1484)
==9303==    by 0x427756: execlist (exec.c:1267)
==9303==    by 0x42717C: execode (exec.c:1073)
==9303==    by 0x431299: runshfunc (exec.c:5040)
==9303==    by 0x430E76: doshfunc (exec.c:4920)
==9303==    by 0x4302FB: execshfunc (exec.c:4557)
==9303==    by 0x42D8C1: execcmd (exec.c:3373)
==9303== 
==9303== 
==9303== 2 errors in context 2 of 2:
==9303== Conditional jump or move depends on uninitialised value(s)
==9303==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9303==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9303==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9303==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9303==    by 0x42D8E9: execcmd (exec.c:3378)
==9303==    by 0x428CA0: execpline2 (exec.c:1697)
==9303==    by 0x427FD2: execpline (exec.c:1484)
==9303==    by 0x42779A: execlist (exec.c:1275)
==9303==    by 0x42717C: execode (exec.c:1073)
==9303==    by 0x431299: runshfunc (exec.c:5040)
==9303==    by 0x430E76: doshfunc (exec.c:4920)
==9303==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9303== 
==9303== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9307-- Caught __NR_exit; running __libc_freeres()
==9307== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9307-by-pythonnut-on-???
==9307== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9307-by-pythonnut-on-???
==9307== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9307-by-pythonnut-on-???
==9307== 
==9307== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9307== don't want to do, unless you know exactly what you're doing,
==9307== or are doing some strange experiment):
==9307==   /usr/lib/valgrind/../../bin/vgdb --pid=9307 ...command...
==9307== 
==9307== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9307==   /path/to/gdb ./zsh
==9307== and then give GDB the following command
==9307==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9307
==9307== --pid is optional if only one valgrind process is running
==9307== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
--9307-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9307== 
==9307== HEAP SUMMARY:
==9307==     in use at exit: 3,111,401 bytes in 68,846 blocks
==9307==   total heap usage: 928,222 allocs, 859,376 frees, 65,544,646 bytes allocated
==9307== 
==9307== Searching for pointers to 68,846 not-freed blocks
--9307--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9307--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9307--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9307--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9307--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9307--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9307--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9307--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9307--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9307--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9307--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9307--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9307--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9307--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9307--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9307--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9307--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9307--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9307--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9307--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9307--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9307--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9307--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9307--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9307--   Scanning root segment: 0x701a000..0x701afff (4096)
--9307--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9307--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9307--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9307--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9307--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9307--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9307--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9307--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9307--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9307== Checked 4,756,424 bytes
==9307== 
==9307== LEAK SUMMARY:
==9307==    definitely lost: 1,533 bytes in 8 blocks
==9307==    indirectly lost: 6,756 bytes in 7 blocks
==9307==      possibly lost: 0 bytes in 0 blocks
==9307==    still reachable: 3,103,112 bytes in 68,831 blocks
==9307==         suppressed: 0 bytes in 0 blocks
==9307== Rerun with --leak-check=full to see details of leaked memory
==9307== 
==9307== Use --track-origins=yes to see where uninitialised values come from
==9307== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9307== 
==9307== 1 errors in context 1 of 2:
==9307== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9307==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9307==    by 0x488CD0: stringsubst (subst.c:301)
==9307==    by 0x48801B: prefork (subst.c:77)
==9307==    by 0x42B318: execcmd (exec.c:2619)
==9307==    by 0x428CA0: execpline2 (exec.c:1697)
==9307==    by 0x427FD2: execpline (exec.c:1484)
==9307==    by 0x427756: execlist (exec.c:1267)
==9307==    by 0x42717C: execode (exec.c:1073)
==9307==    by 0x431299: runshfunc (exec.c:5040)
==9307==    by 0x430E76: doshfunc (exec.c:4920)
==9307==    by 0x4302FB: execshfunc (exec.c:4557)
==9307==    by 0x42D8C1: execcmd (exec.c:3373)
==9307== 
==9307== 
==9307== 2 errors in context 2 of 2:
==9307== Conditional jump or move depends on uninitialised value(s)
==9307==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9307==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9307==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9307==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9307==    by 0x42D8E9: execcmd (exec.c:3378)
==9307==    by 0x428CA0: execpline2 (exec.c:1697)
==9307==    by 0x427FD2: execpline (exec.c:1484)
==9307==    by 0x42779A: execlist (exec.c:1275)
==9307==    by 0x42717C: execode (exec.c:1073)
==9307==    by 0x431299: runshfunc (exec.c:5040)
==9307==    by 0x430E76: doshfunc (exec.c:4920)
==9307==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9307== 
==9307== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9306-- Caught __NR_exit; running __libc_freeres()
==9306== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9306-by-pythonnut-on-???
==9306== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9306-by-pythonnut-on-???
==9306== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9306-by-pythonnut-on-???
==9306== 
==9306== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9306== don't want to do, unless you know exactly what you're doing,
==9306== or are doing some strange experiment):
==9306==   /usr/lib/valgrind/../../bin/vgdb --pid=9306 ...command...
==9306== 
==9306== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9306==   /path/to/gdb ./zsh
==9306== and then give GDB the following command
==9306==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9306
==9306== --pid is optional if only one valgrind process is running
==9306== 
--9306-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9306== 
==9306== HEAP SUMMARY:
==9306==     in use at exit: 3,111,369 bytes in 68,846 blocks
==9306==   total heap usage: 928,226 allocs, 859,380 frees, 65,544,182 bytes allocated
==9306== 
==9306== Searching for pointers to 68,846 not-freed blocks
--9306--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9306--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9306--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9306--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9306--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9306--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9306--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9306--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9306--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9306--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9306--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9306--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9306--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9306--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9306--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9306--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9306--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9306--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9306--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9306--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9306--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9306--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9306--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9306--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9306--   Scanning root segment: 0x701a000..0x701afff (4096)
--9306--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9306--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9306--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9306--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9306--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9306--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9306--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9306--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9306--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9306== Checked 4,756,088 bytes
==9306== 
==9306== LEAK SUMMARY:
==9306==    definitely lost: 1,533 bytes in 8 blocks
==9306==    indirectly lost: 6,756 bytes in 7 blocks
==9306==      possibly lost: 0 bytes in 0 blocks
==9306==    still reachable: 3,103,080 bytes in 68,831 blocks
==9306==         suppressed: 0 bytes in 0 blocks
==9306== Rerun with --leak-check=full to see details of leaked memory
==9306== 
==9306== Use --track-origins=yes to see where uninitialised values come from
==9306== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9306== 
==9306== 1 errors in context 1 of 2:
==9306== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9306==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9306==    by 0x488CD0: stringsubst (subst.c:301)
==9306==    by 0x48801B: prefork (subst.c:77)
==9306==    by 0x42B318: execcmd (exec.c:2619)
==9306==    by 0x428CA0: execpline2 (exec.c:1697)
==9306==    by 0x427FD2: execpline (exec.c:1484)
==9306==    by 0x427756: execlist (exec.c:1267)
==9306==    by 0x42717C: execode (exec.c:1073)
==9306==    by 0x431299: runshfunc (exec.c:5040)
==9306==    by 0x430E76: doshfunc (exec.c:4920)
==9306==    by 0x4302FB: execshfunc (exec.c:4557)
==9306==    by 0x42D8C1: execcmd (exec.c:3373)
==9306== 
==9306== 
==9306== 2 errors in context 2 of 2:
==9306== Conditional jump or move depends on uninitialised value(s)
==9306==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9306==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9306==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9306==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9306==    by 0x42D8E9: execcmd (exec.c:3378)
==9306==    by 0x428CA0: execpline2 (exec.c:1697)
==9306==    by 0x427FD2: execpline (exec.c:1484)
==9306==    by 0x42779A: execlist (exec.c:1275)
==9306==    by 0x42717C: execode (exec.c:1073)
==9306==    by 0x431299: runshfunc (exec.c:5040)
==9306==    by 0x430E76: doshfunc (exec.c:4920)
==9306==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9306== 
==9306== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--9310-- Caught __NR_exit; running __libc_freeres()
==9310== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9310-by-pythonnut-on-???
==9310== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9310-by-pythonnut-on-???
==9310== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9310-by-pythonnut-on-???
==9310== 
==9310== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9310== don't want to do, unless you know exactly what you're doing,
==9310== or are doing some strange experiment):
==9310==   /usr/lib/valgrind/../../bin/vgdb --pid=9310 ...command...
==9310== 
==9310== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9310==   /path/to/gdb ./zsh
==9310== and then give GDB the following command
==9310==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9310
==9310== --pid is optional if only one valgrind process is running
==9310== 
--9310-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9310== 
==9310== HEAP SUMMARY:
==9310==     in use at exit: 3,111,620 bytes in 68,851 blocks
==9310==   total heap usage: 928,237 allocs, 859,386 frees, 65,549,290 bytes allocated
==9310== 
==9310== Searching for pointers to 68,851 not-freed blocks
--9310--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9310--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9310--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9310--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9310--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9310--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9310--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9310--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9310--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9310--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9310--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9310--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9310--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9310--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9310--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9310--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9310--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9310--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9310--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9310--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9310--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9310--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9310--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9310--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9310--   Scanning root segment: 0x701a000..0x701afff (4096)
--9310--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9310--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9310--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9310--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9310--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9310--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9310--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9310--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9310--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9310== Checked 4,754,784 bytes
==9310== 
==9310== LEAK SUMMARY:
==9310==    definitely lost: 1,533 bytes in 8 blocks
==9310==    indirectly lost: 6,756 bytes in 7 blocks
==9310==      possibly lost: 0 bytes in 0 blocks
==9310==    still reachable: 3,103,331 bytes in 68,836 blocks
==9310==         suppressed: 0 bytes in 0 blocks
==9310== Rerun with --leak-check=full to see details of leaked memory
==9310== 
==9310== Use --track-origins=yes to see where uninitialised values come from
==9310== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9310== 
==9310== 1 errors in context 1 of 2:
==9310== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9310==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9310==    by 0x488CD0: stringsubst (subst.c:301)
==9310==    by 0x48801B: prefork (subst.c:77)
==9310==    by 0x42B318: execcmd (exec.c:2619)
==9310==    by 0x428CA0: execpline2 (exec.c:1697)
==9310==    by 0x427FD2: execpline (exec.c:1484)
==9310==    by 0x427756: execlist (exec.c:1267)
==9310==    by 0x42717C: execode (exec.c:1073)
==9310==    by 0x431299: runshfunc (exec.c:5040)
==9310==    by 0x430E76: doshfunc (exec.c:4920)
==9310==    by 0x4302FB: execshfunc (exec.c:4557)
==9310==    by 0x42D8C1: execcmd (exec.c:3373)
==9310== 
==9310== 
==9310== 2 errors in context 2 of 2:
==9310== Conditional jump or move depends on uninitialised value(s)
==9310==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9310==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9310==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9310==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9310==    by 0x42D8E9: execcmd (exec.c:3378)
==9310==    by 0x428CA0: execpline2 (exec.c:1697)
==9310==    by 0x427FD2: execpline (exec.c:1484)
==9310==    by 0x42779A: execlist (exec.c:1275)
==9310==    by 0x42717C: execode (exec.c:1073)
==9310==    by 0x431299: runshfunc (exec.c:5040)
==9310==    by 0x430E76: doshfunc (exec.c:4920)
==9310==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9310== 
==9310== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9314-- Caught __NR_exit; running __libc_freeres()
==9314== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9314-by-pythonnut-on-???
==9314== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9314-by-pythonnut-on-???
==9314== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9314-by-pythonnut-on-???
==9314== 
==9314== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9314== don't want to do, unless you know exactly what you're doing,
==9314== or are doing some strange experiment):
==9314==   /usr/lib/valgrind/../../bin/vgdb --pid=9314 ...command...
==9314== 
==9314== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9314==   /path/to/gdb ./zsh
==9314== and then give GDB the following command
==9314==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9314
==9314== --pid is optional if only one valgrind process is running
==9314== 
--9314-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9314== 
==9314== HEAP SUMMARY:
==9314==     in use at exit: 3,111,727 bytes in 68,855 blocks
==9314==   total heap usage: 928,245 allocs, 859,390 frees, 65,551,509 bytes allocated
==9314== 
==9314== Searching for pointers to 68,855 not-freed blocks
--9314--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9314--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9314--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9314--   Scanning root segment: 0x4037000..0x403afff (16384)
--9314--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9314--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9314--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9314--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9314--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9314--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9314--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9314--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9314--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9314--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9314--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9314--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9314--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9314--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9314--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9314--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9314--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9314--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9314--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9314--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9314--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9314--   Scanning root segment: 0x701a000..0x701afff (4096)
--9314--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9314--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9314--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9314--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9314--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9314--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9314--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9314--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9314--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9314== Checked 4,771,536 bytes
==9314== 
==9314== LEAK SUMMARY:
==9314==    definitely lost: 1,533 bytes in 8 blocks
==9314==    indirectly lost: 6,756 bytes in 7 blocks
==9314==      possibly lost: 0 bytes in 0 blocks
==9314==    still reachable: 3,103,438 bytes in 68,840 blocks
==9314==         suppressed: 0 bytes in 0 blocks
==9314== Rerun with --leak-check=full to see details of leaked memory
==9314== 
==9314== Use --track-origins=yes to see where uninitialised values come from
==9314== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9314== 
==9314== 1 errors in context 1 of 2:
==9314== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9314==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9314==    by 0x488CD0: stringsubst (subst.c:301)
==9314==    by 0x48801B: prefork (subst.c:77)
==9314==    by 0x42B318: execcmd (exec.c:2619)
==9314==    by 0x428CA0: execpline2 (exec.c:1697)
==9314==    by 0x427FD2: execpline (exec.c:1484)
==9314==    by 0x427756: execlist (exec.c:1267)
==9314==    by 0x42717C: execode (exec.c:1073)
==9314==    by 0x431299: runshfunc (exec.c:5040)
==9314==    by 0x430E76: doshfunc (exec.c:4920)
==9314==    by 0x4302FB: execshfunc (exec.c:4557)
==9314==    by 0x42D8C1: execcmd (exec.c:3373)
==9314== 
==9314== 
==9314== 2 errors in context 2 of 2:
==9314== Conditional jump or move depends on uninitialised value(s)
==9314==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9314==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9314==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9314==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9314==    by 0x42D8E9: execcmd (exec.c:3378)
==9314==    by 0x428CA0: execpline2 (exec.c:1697)
==9314==    by 0x427FD2: execpline (exec.c:1484)
==9314==    by 0x42779A: execlist (exec.c:1275)
==9314==    by 0x42717C: execode (exec.c:1073)
==9314==    by 0x431299: runshfunc (exec.c:5040)
==9314==    by 0x430E76: doshfunc (exec.c:4920)
==9314==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9314== 
==9314== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--9318-- Caught __NR_exit; running __libc_freeres()
==9318== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9318-by-pythonnut-on-???
==9318== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9318-by-pythonnut-on-???
==9318== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9318-by-pythonnut-on-???
==9318== 
==9318== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9318== don't want to do, unless you know exactly what you're doing,
==9318== or are doing some strange experiment):
==9318==   /usr/lib/valgrind/../../bin/vgdb --pid=9318 ...command...
==9318== 
==9318== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9318==   /path/to/gdb ./zsh
==9318== and then give GDB the following command
==9318==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9318
==9318== --pid is optional if only one valgrind process is running
==9318== 
--9318-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9318== 
==9318== HEAP SUMMARY:
==9318==     in use at exit: 3,111,034 bytes in 68,840 blocks
==9318==   total heap usage: 928,295 allocs, 859,455 frees, 65,558,062 bytes allocated
==9318== 
==9318== Searching for pointers to 68,840 not-freed blocks
--9318--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9318--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9318--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9318--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9318--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9318--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9318--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9318--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9318--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9318--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9318--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9318--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9318--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9318--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9318--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9318--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9318--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9318--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9318--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9318--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9318--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9318--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9318--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9318--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9318--   Scanning root segment: 0x701a000..0x701afff (4096)
--9318--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9318--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9318--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9318--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9318--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9318--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9318--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9318--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9318--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9318== Checked 4,771,696 bytes
==9318== 
==9318== LEAK SUMMARY:
==9318==    definitely lost: 1,533 bytes in 8 blocks
==9318==    indirectly lost: 6,756 bytes in 7 blocks
==9318==      possibly lost: 0 bytes in 0 blocks
==9318==    still reachable: 3,102,745 bytes in 68,825 blocks
==9318==         suppressed: 0 bytes in 0 blocks
==9318== Rerun with --leak-check=full to see details of leaked memory
==9318== 
==9318== Use --track-origins=yes to see where uninitialised values come from
==9318== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9318== 
==9318== 1 errors in context 1 of 2:
==9318== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9318==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9318==    by 0x488CD0: stringsubst (subst.c:301)
==9318==    by 0x48801B: prefork (subst.c:77)
==9318==    by 0x42B318: execcmd (exec.c:2619)
==9318==    by 0x428CA0: execpline2 (exec.c:1697)
==9318==    by 0x427FD2: execpline (exec.c:1484)
==9318==    by 0x427756: execlist (exec.c:1267)
==9318==    by 0x42717C: execode (exec.c:1073)
==9318==    by 0x431299: runshfunc (exec.c:5040)
==9318==    by 0x430E76: doshfunc (exec.c:4920)
==9318==    by 0x4302FB: execshfunc (exec.c:4557)
==9318==    by 0x42D8C1: execcmd (exec.c:3373)
==9318== 
==9318== 
==9318== 2 errors in context 2 of 2:
==9318== Conditional jump or move depends on uninitialised value(s)
==9318==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9318==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9318==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9318==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9318==    by 0x42D8E9: execcmd (exec.c:3378)
==9318==    by 0x428CA0: execpline2 (exec.c:1697)
==9318==    by 0x427FD2: execpline (exec.c:1484)
==9318==    by 0x42779A: execlist (exec.c:1275)
==9318==    by 0x42717C: execode (exec.c:1073)
==9318==    by 0x431299: runshfunc (exec.c:5040)
==9318==    by 0x430E76: doshfunc (exec.c:4920)
==9318==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9318== 
==9318== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9319== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9319-by-pythonnut-on-???
==9319== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9319-by-pythonnut-on-???
==9319== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9319-by-pythonnut-on-???
==9319== 
==9319== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9319== don't want to do, unless you know exactly what you're doing,
==9319== or are doing some strange experiment):
==9319==   /usr/lib/valgrind/../../bin/vgdb --pid=9319 ...command...
==9319== 
==9319== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9319==   /path/to/gdb ./zsh
==9319== and then give GDB the following command
==9319==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9319
==9319== --pid is optional if only one valgrind process is running
==9319== 
--9319-- Caught __NR_exit; running __libc_freeres()
--9319-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9319== 
==9319== HEAP SUMMARY:
==9319==     in use at exit: 3,112,534 bytes in 68,891 blocks
==9319==   total heap usage: 928,389 allocs, 859,498 frees, 65,566,232 bytes allocated
==9319== 
==9319== Searching for pointers to 68,891 not-freed blocks
--9319--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9319--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9319--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9319--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9319--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9319--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9319--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9319--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9319--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9319--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9319--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9319--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9319--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9319--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9319--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9319--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9319--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9319--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9319--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9319--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9319--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9319--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9319--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9319--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9319--   Scanning root segment: 0x701a000..0x701afff (4096)
--9319--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9319--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9319--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9319--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9319--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9319--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9319--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9319--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9319--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9319== Checked 4,773,224 bytes
==9319== 
==9319== LEAK SUMMARY:
==9319==    definitely lost: 1,533 bytes in 8 blocks
==9319==    indirectly lost: 6,756 bytes in 7 blocks
==9319==      possibly lost: 0 bytes in 0 blocks
==9319==    still reachable: 3,104,245 bytes in 68,876 blocks
==9319==         suppressed: 0 bytes in 0 blocks
==9319== Rerun with --leak-check=full to see details of leaked memory
==9319== 
==9319== Use --track-origins=yes to see where uninitialised values come from
==9319== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9319== 
==9319== 1 errors in context 1 of 2:
==9319== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9319==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9319==    by 0x488CD0: stringsubst (subst.c:301)
==9319==    by 0x48801B: prefork (subst.c:77)
==9319==    by 0x42B318: execcmd (exec.c:2619)
==9319==    by 0x428CA0: execpline2 (exec.c:1697)
==9319==    by 0x427FD2: execpline (exec.c:1484)
==9319==    by 0x427756: execlist (exec.c:1267)
==9319==    by 0x42717C: execode (exec.c:1073)
==9319==    by 0x431299: runshfunc (exec.c:5040)
==9319==    by 0x430E76: doshfunc (exec.c:4920)
==9319==    by 0x4302FB: execshfunc (exec.c:4557)
==9319==    by 0x42D8C1: execcmd (exec.c:3373)
==9319== 
==9319== 
==9319== 2 errors in context 2 of 2:
==9319== Conditional jump or move depends on uninitialised value(s)
==9319==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9319==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9319==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9319==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9319==    by 0x42D8E9: execcmd (exec.c:3378)
==9319==    by 0x428CA0: execpline2 (exec.c:1697)
==9319==    by 0x427FD2: execpline (exec.c:1484)
==9319==    by 0x42779A: execlist (exec.c:1275)
==9319==    by 0x42717C: execode (exec.c:1073)
==9319==    by 0x431299: runshfunc (exec.c:5040)
==9319==    by 0x430E76: doshfunc (exec.c:4920)
==9319==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9319== 
==9319== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9320== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9320-by-pythonnut-on-???
==9320== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9320-by-pythonnut-on-???
==9320== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9320-by-pythonnut-on-???
==9320== 
==9320== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9320== don't want to do, unless you know exactly what you're doing,
==9320== or are doing some strange experiment):
==9320==   /usr/lib/valgrind/../../bin/vgdb --pid=9320 ...command...
==9320== 
==9320== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9320==   /path/to/gdb ./zsh
==9320== and then give GDB the following command
==9320==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9320
==9320== --pid is optional if only one valgrind process is running
==9320== 
==9321== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9321-by-pythonnut-on-???
==9321== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9321-by-pythonnut-on-???
==9321== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9321-by-pythonnut-on-???
==9321== 
==9321== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9321== don't want to do, unless you know exactly what you're doing,
==9321== or are doing some strange experiment):
==9321==   /usr/lib/valgrind/../../bin/vgdb --pid=9321 ...command...
==9321== 
==9321== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9321==   /path/to/gdb ./zsh
==9321== and then give GDB the following command
==9321==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9321
==9321== --pid is optional if only one valgrind process is running
==9321== 
==9322== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9322-by-pythonnut-on-???
==9322== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9322-by-pythonnut-on-???
==9322== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9322-by-pythonnut-on-???
==9322== 
==9322== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9322== don't want to do, unless you know exactly what you're doing,
==9322== or are doing some strange experiment):
==9322==   /usr/lib/valgrind/../../bin/vgdb --pid=9322 ...command...
==9322== 
==9322== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9322==   /path/to/gdb ./zsh
==9322== and then give GDB the following command
==9322==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9322
==9322== --pid is optional if only one valgrind process is running
==9322== 
client request: code 4d430005,  addr 0xFFEFF0B2C,  len 4
--9322-- Caught __NR_exit; running __libc_freeres()
--9322-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9322== 
==9322== HEAP SUMMARY:
==9322==     in use at exit: 3,116,429 bytes in 68,958 blocks
==9322==   total heap usage: 928,531 allocs, 859,573 frees, 65,597,317 bytes allocated
==9322== 
==9322== Searching for pointers to 68,958 not-freed blocks
--9322--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9322--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9322--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9322--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9322--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9322--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9322--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9322--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9322--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9322--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9322--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9322--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9322--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9322--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9322--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9322--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9322--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9322--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9322--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9322--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9322--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9322--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9322--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9322--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9322--   Scanning root segment: 0x701a000..0x701afff (4096)
--9322--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9322--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9322--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9322--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9322--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9322--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9322--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9322--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9322--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9322== Checked 4,759,760 bytes
==9322== 
==9322== LEAK SUMMARY:
==9322==    definitely lost: 1,533 bytes in 8 blocks
==9322==    indirectly lost: 6,756 bytes in 7 blocks
==9322==      possibly lost: 0 bytes in 0 blocks
==9322==    still reachable: 3,108,140 bytes in 68,943 blocks
==9322==         suppressed: 0 bytes in 0 blocks
==9322== Rerun with --leak-check=full to see details of leaked memory
==9322== 
==9322== Use --track-origins=yes to see where uninitialised values come from
==9322== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9322== 
==9322== 1 errors in context 1 of 2:
==9322== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9322==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9322==    by 0x488CD0: stringsubst (subst.c:301)
==9322==    by 0x48801B: prefork (subst.c:77)
==9322==    by 0x42B318: execcmd (exec.c:2619)
==9322==    by 0x428CA0: execpline2 (exec.c:1697)
==9322==    by 0x427FD2: execpline (exec.c:1484)
==9322==    by 0x427756: execlist (exec.c:1267)
==9322==    by 0x42717C: execode (exec.c:1073)
==9322==    by 0x431299: runshfunc (exec.c:5040)
==9322==    by 0x430E76: doshfunc (exec.c:4920)
==9322==    by 0x4302FB: execshfunc (exec.c:4557)
==9322==    by 0x42D8C1: execcmd (exec.c:3373)
==9322== 
==9322== 
==9322== 2 errors in context 2 of 2:
==9322== Conditional jump or move depends on uninitialised value(s)
==9322==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9322==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9322==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9322==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9322==    by 0x42D8E9: execcmd (exec.c:3378)
==9322==    by 0x428CA0: execpline2 (exec.c:1697)
==9322==    by 0x427FD2: execpline (exec.c:1484)
==9322==    by 0x42779A: execlist (exec.c:1275)
==9322==    by 0x42717C: execode (exec.c:1073)
==9322==    by 0x431299: runshfunc (exec.c:5040)
==9322==    by 0x430E76: doshfunc (exec.c:4920)
==9322==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9322== 
==9322== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9325-- Caught __NR_exit; running __libc_freeres()
==9326== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9326-by-pythonnut-on-???
==9326== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9326-by-pythonnut-on-???
==9326== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9326-by-pythonnut-on-???
==9326== 
==9326== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9326== don't want to do, unless you know exactly what you're doing,
==9326== or are doing some strange experiment):
==9326==   /usr/lib/valgrind/../../bin/vgdb --pid=9326 ...command...
==9326== 
==9326== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9326==   /path/to/gdb ./zsh
==9326== and then give GDB the following command
==9326==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9326
==9326== --pid is optional if only one valgrind process is running
==9326== 
==9325== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9325-by-pythonnut-on-???
==9325== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9325-by-pythonnut-on-???
==9325== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9325-by-pythonnut-on-???
==9325== 
==9325== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9325== don't want to do, unless you know exactly what you're doing,
==9325== or are doing some strange experiment):
==9325==   /usr/lib/valgrind/../../bin/vgdb --pid=9325 ...command...
==9325== 
==9325== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9325==   /path/to/gdb ./zsh
==9325== and then give GDB the following command
==9325==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9325
==9325== --pid is optional if only one valgrind process is running
==9325== 
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9325-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9325== 
==9325== HEAP SUMMARY:
==9325==     in use at exit: 3,153,320 bytes in 68,966 blocks
==9325==   total heap usage: 928,539 allocs, 859,573 frees, 65,637,264 bytes allocated
==9325== 
==9325== Searching for pointers to 68,966 not-freed blocks
--9325--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9325--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9325--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9325--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9325--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9325--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9325--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9325--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9325--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9325--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9325--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9325--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9325--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9325--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9325--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9325--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9325--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9325--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9325--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9325--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9325--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9325--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9325--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9325--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9325--   Scanning root segment: 0x701a000..0x701afff (4096)
--9325--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9325--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9325--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9325--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9325--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9325--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9325--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9325--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9325--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9325== Checked 4,871,568 bytes
==9325== 
==9325== LEAK SUMMARY:
==9325==    definitely lost: 1,533 bytes in 8 blocks
==9325==    indirectly lost: 6,756 bytes in 7 blocks
==9325==      possibly lost: 0 bytes in 0 blocks
==9325==    still reachable: 3,145,031 bytes in 68,951 blocks
==9325==         suppressed: 0 bytes in 0 blocks
==9325== Rerun with --leak-check=full to see details of leaked memory
==9325== 
==9325== Use --track-origins=yes to see where uninitialised values come from
==9325== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9325== 
==9325== 1 errors in context 1 of 2:
==9325== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9325==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9325==    by 0x488CD0: stringsubst (subst.c:301)
==9325==    by 0x48801B: prefork (subst.c:77)
==9325==    by 0x42B318: execcmd (exec.c:2619)
==9325==    by 0x428CA0: execpline2 (exec.c:1697)
==9325==    by 0x427FD2: execpline (exec.c:1484)
==9325==    by 0x427756: execlist (exec.c:1267)
==9325==    by 0x42717C: execode (exec.c:1073)
==9325==    by 0x431299: runshfunc (exec.c:5040)
==9325==    by 0x430E76: doshfunc (exec.c:4920)
==9325==    by 0x4302FB: execshfunc (exec.c:4557)
==9325==    by 0x42D8C1: execcmd (exec.c:3373)
==9325== 
==9325== 
==9325== 2 errors in context 2 of 2:
==9325== Conditional jump or move depends on uninitialised value(s)
==9325==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9325==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9325==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9325==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9325==    by 0x42D8E9: execcmd (exec.c:3378)
==9325==    by 0x428CA0: execpline2 (exec.c:1697)
==9325==    by 0x427FD2: execpline (exec.c:1484)
==9325==    by 0x42779A: execlist (exec.c:1275)
==9325==    by 0x42717C: execode (exec.c:1073)
==9325==    by 0x431299: runshfunc (exec.c:5040)
==9325==    by 0x430E76: doshfunc (exec.c:4920)
==9325==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9325== 
==9325== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9324== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9324-by-pythonnut-on-???
==9324== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9324-by-pythonnut-on-???
==9324== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9324-by-pythonnut-on-???
==9324== 
==9324== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9324== don't want to do, unless you know exactly what you're doing,
==9324== or are doing some strange experiment):
==9324==   /usr/lib/valgrind/../../bin/vgdb --pid=9324 ...command...
==9324== 
==9324== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9324==   /path/to/gdb ./zsh
==9324== and then give GDB the following command
==9324==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9324
==9324== --pid is optional if only one valgrind process is running
==9324== 
--9324-- Caught __NR_exit; running __libc_freeres()
--9324-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9324== 
==9324== HEAP SUMMARY:
==9324==     in use at exit: 3,153,256 bytes in 68,963 blocks
==9324==   total heap usage: 928,541 allocs, 859,578 frees, 65,637,808 bytes allocated
==9324== 
==9324== Searching for pointers to 68,963 not-freed blocks
--9324--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9324--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9324--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9324--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9324--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9324--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9324--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9324--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9324--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9324--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9324--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9324--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9324--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9324--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9324--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9324--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9324--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9324--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9324--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9324--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9324--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9324--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9324--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9324--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9324--   Scanning root segment: 0x701a000..0x701afff (4096)
--9324--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9324--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9324--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9324--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9324--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9324--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9324--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9324--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9324--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9324== Checked 4,870,904 bytes
==9324== 
==9324== LEAK SUMMARY:
==9324==    definitely lost: 1,533 bytes in 8 blocks
==9324==    indirectly lost: 6,756 bytes in 7 blocks
==9324==      possibly lost: 0 bytes in 0 blocks
==9324==    still reachable: 3,144,967 bytes in 68,948 blocks
==9324==         suppressed: 0 bytes in 0 blocks
==9324== Rerun with --leak-check=full to see details of leaked memory
==9324== 
==9324== Use --track-origins=yes to see where uninitialised values come from
==9324== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9324== 
==9324== 1 errors in context 1 of 2:
==9324== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9324==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9324==    by 0x488CD0: stringsubst (subst.c:301)
==9324==    by 0x48801B: prefork (subst.c:77)
==9324==    by 0x42B318: execcmd (exec.c:2619)
==9324==    by 0x428CA0: execpline2 (exec.c:1697)
==9324==    by 0x427FD2: execpline (exec.c:1484)
==9324==    by 0x427756: execlist (exec.c:1267)
==9324==    by 0x42717C: execode (exec.c:1073)
==9324==    by 0x431299: runshfunc (exec.c:5040)
==9324==    by 0x430E76: doshfunc (exec.c:4920)
==9324==    by 0x4302FB: execshfunc (exec.c:4557)
==9324==    by 0x42D8C1: execcmd (exec.c:3373)
==9324== 
==9324== 
==9324== 2 errors in context 2 of 2:
==9324== Conditional jump or move depends on uninitialised value(s)
==9324==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9324==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9324==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9324==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9324==    by 0x42D8E9: execcmd (exec.c:3378)
==9324==    by 0x428CA0: execpline2 (exec.c:1697)
==9324==    by 0x427FD2: execpline (exec.c:1484)
==9324==    by 0x42779A: execlist (exec.c:1275)
==9324==    by 0x42717C: execode (exec.c:1073)
==9324==    by 0x431299: runshfunc (exec.c:5040)
==9324==    by 0x430E76: doshfunc (exec.c:4920)
==9324==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9324== 
==9324== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9329== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9329-by-pythonnut-on-???
==9329== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9329-by-pythonnut-on-???
==9329== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9329-by-pythonnut-on-???
==9329== 
==9329== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9329== don't want to do, unless you know exactly what you're doing,
==9329== or are doing some strange experiment):
==9329==   /usr/lib/valgrind/../../bin/vgdb --pid=9329 ...command...
==9329== 
==9329== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9329==   /path/to/gdb ./zsh
==9329== and then give GDB the following command
==9329==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9329
==9329== --pid is optional if only one valgrind process is running
==9329== 
==9330== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9330-by-pythonnut-on-???
==9330== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9330-by-pythonnut-on-???
==9330== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9330-by-pythonnut-on-???
==9330== 
==9330== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9330== don't want to do, unless you know exactly what you're doing,
==9330== or are doing some strange experiment):
==9330==   /usr/lib/valgrind/../../bin/vgdb --pid=9330 ...command...
==9330== 
==9330== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9330==   /path/to/gdb ./zsh
==9330== and then give GDB the following command
==9330==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9330
==9330== --pid is optional if only one valgrind process is running
==9330== 
--9330-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9330-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9330== 
==9330== HEAP SUMMARY:
==9330==     in use at exit: 3,189,966 bytes in 68,969 blocks
==9330==   total heap usage: 928,548 allocs, 859,579 frees, 65,676,091 bytes allocated
==9330== 
==9330== Searching for pointers to 68,969 not-freed blocks
--9330--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9330--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9330--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9330--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9330--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9330--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9330--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9330--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9330--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9330--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9330--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9330--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9330--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9330--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9330--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9330--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9330--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9330--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9330--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9330--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9330--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9330--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9330--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9330--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9330--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9330--   Scanning root segment: 0x701a000..0x701afff (4096)
--9330--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9330--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9330--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9330--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9330--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9330--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9330--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9330--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9330--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9330== Checked 4,945,088 bytes
==9330== 
==9330== LEAK SUMMARY:
==9330==    definitely lost: 1,533 bytes in 8 blocks
==9330==    indirectly lost: 6,756 bytes in 7 blocks
==9330==      possibly lost: 0 bytes in 0 blocks
==9330==    still reachable: 3,181,677 bytes in 68,954 blocks
==9330==         suppressed: 0 bytes in 0 blocks
==9330== Rerun with --leak-check=full to see details of leaked memory
==9330== 
==9330== Use --track-origins=yes to see where uninitialised values come from
==9330== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9330== 
==9330== 1 errors in context 1 of 2:
==9330== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9330==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9330==    by 0x488CD0: stringsubst (subst.c:301)
==9330==    by 0x48801B: prefork (subst.c:77)
==9330==    by 0x42B318: execcmd (exec.c:2619)
==9330==    by 0x428CA0: execpline2 (exec.c:1697)
==9330==    by 0x427FD2: execpline (exec.c:1484)
==9330==    by 0x427756: execlist (exec.c:1267)
==9330==    by 0x42717C: execode (exec.c:1073)
==9330==    by 0x431299: runshfunc (exec.c:5040)
==9330==    by 0x430E76: doshfunc (exec.c:4920)
==9330==    by 0x4302FB: execshfunc (exec.c:4557)
==9330==    by 0x42D8C1: execcmd (exec.c:3373)
==9330== 
==9330== 
==9330== 2 errors in context 2 of 2:
==9330== Conditional jump or move depends on uninitialised value(s)
==9330==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9330==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9330==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9330==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9330==    by 0x42D8E9: execcmd (exec.c:3378)
==9330==    by 0x428CA0: execpline2 (exec.c:1697)
==9330==    by 0x427FD2: execpline (exec.c:1484)
==9330==    by 0x42779A: execlist (exec.c:1275)
==9330==    by 0x42717C: execode (exec.c:1073)
==9330==    by 0x431299: runshfunc (exec.c:5040)
==9330==    by 0x430E76: doshfunc (exec.c:4920)
==9330==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9330== 
==9330== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9329-- Caught __NR_exit; running __libc_freeres()
--9329-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9329== 
==9329== HEAP SUMMARY:
==9329==     in use at exit: 3,153,326 bytes in 68,966 blocks
==9329==   total heap usage: 928,551 allocs, 859,585 frees, 65,676,667 bytes allocated
==9329== 
==9329== Searching for pointers to 68,966 not-freed blocks
--9329--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9329--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9329--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9329--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9329--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9329--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9329--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9329--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9329--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9329--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9329--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9329--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9329--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9329--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9329--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9329--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9329--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9329--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9329--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9329--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9329--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9329--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9329--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9329--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9329--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9329--   Scanning root segment: 0x701a000..0x701afff (4096)
--9329--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9329--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9329--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9329--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9329--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9329--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9329--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9329--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9329--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9329== Checked 4,907,832 bytes
==9329== 
==9329== LEAK SUMMARY:
==9329==    definitely lost: 1,533 bytes in 8 blocks
==9329==    indirectly lost: 6,756 bytes in 7 blocks
==9329==      possibly lost: 0 bytes in 0 blocks
==9329==    still reachable: 3,145,037 bytes in 68,951 blocks
==9329==         suppressed: 0 bytes in 0 blocks
==9329== Rerun with --leak-check=full to see details of leaked memory
==9329== 
==9329== Use --track-origins=yes to see where uninitialised values come from
==9329== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9329== 
==9329== 1 errors in context 1 of 2:
==9329== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9329==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9329==    by 0x488CD0: stringsubst (subst.c:301)
==9329==    by 0x48801B: prefork (subst.c:77)
==9329==    by 0x42B318: execcmd (exec.c:2619)
==9329==    by 0x428CA0: execpline2 (exec.c:1697)
==9329==    by 0x427FD2: execpline (exec.c:1484)
==9329==    by 0x427756: execlist (exec.c:1267)
==9329==    by 0x42717C: execode (exec.c:1073)
==9329==    by 0x431299: runshfunc (exec.c:5040)
==9329==    by 0x430E76: doshfunc (exec.c:4920)
==9329==    by 0x4302FB: execshfunc (exec.c:4557)
==9329==    by 0x42D8C1: execcmd (exec.c:3373)
==9329== 
==9329== 
==9329== 2 errors in context 2 of 2:
==9329== Conditional jump or move depends on uninitialised value(s)
==9329==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9329==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9329==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9329==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9329==    by 0x42D8E9: execcmd (exec.c:3378)
==9329==    by 0x428CA0: execpline2 (exec.c:1697)
==9329==    by 0x427FD2: execpline (exec.c:1484)
==9329==    by 0x42779A: execlist (exec.c:1275)
==9329==    by 0x42717C: execode (exec.c:1073)
==9329==    by 0x431299: runshfunc (exec.c:5040)
==9329==    by 0x430E76: doshfunc (exec.c:4920)
==9329==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9329== 
==9329== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9333-by-pythonnut-on-???
==9333== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9333-by-pythonnut-on-???
==9333== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9333-by-pythonnut-on-???
==9333== 
==9333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9333== don't want to do, unless you know exactly what you're doing,
==9333== or are doing some strange experiment):
==9333==   /usr/lib/valgrind/../../bin/vgdb --pid=9333 ...command...
==9333== 
==9333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9333==   /path/to/gdb ./zsh
==9333== and then give GDB the following command
==9333==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9333
==9333== --pid is optional if only one valgrind process is running
==9333== 
--9333-- Caught __NR_exit; running __libc_freeres()
==9332== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9332-by-pythonnut-on-???
==9332== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9332-by-pythonnut-on-???
==9332== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9332-by-pythonnut-on-???
==9332== 
==9332== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9332== don't want to do, unless you know exactly what you're doing,
==9332== or are doing some strange experiment):
==9332==   /usr/lib/valgrind/../../bin/vgdb --pid=9332 ...command...
==9332== 
==9332== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9332==   /path/to/gdb ./zsh
==9332== and then give GDB the following command
==9332==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9332
==9332== --pid is optional if only one valgrind process is running
==9332== 
--9333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9333== 
==9333== HEAP SUMMARY:
==9333==     in use at exit: 3,154,011 bytes in 68,972 blocks
==9333==   total heap usage: 928,560 allocs, 859,588 frees, 65,644,112 bytes allocated
==9333== 
==9333== Searching for pointers to 68,972 not-freed blocks
--9333--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9333--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9333--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9333--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9333--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9333--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9333--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9333--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9333--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9333--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9333--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9333--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9333--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9333--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9333--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9333--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9333--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9333--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9333--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9333--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9333--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9333--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9333--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9333--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9333--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9333--   Scanning root segment: 0x701a000..0x701afff (4096)
--9333--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9333--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9333--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9333--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9333--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9333--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9333--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9333--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9333--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9333== Checked 4,888,384 bytes
==9333== 
==9333== LEAK SUMMARY:
==9333==    definitely lost: 1,533 bytes in 8 blocks
==9333==    indirectly lost: 6,756 bytes in 7 blocks
==9333==      possibly lost: 0 bytes in 0 blocks
==9333==    still reachable: 3,145,722 bytes in 68,957 blocks
==9333==         suppressed: 0 bytes in 0 blocks
==9333== Rerun with --leak-check=full to see details of leaked memory
==9333== 
==9333== Use --track-origins=yes to see where uninitialised values come from
==9333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9333== 
==9333== 1 errors in context 1 of 2:
==9333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9333==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9333==    by 0x488CD0: stringsubst (subst.c:301)
==9333==    by 0x48801B: prefork (subst.c:77)
==9333==    by 0x42B318: execcmd (exec.c:2619)
==9333==    by 0x428CA0: execpline2 (exec.c:1697)
==9333==    by 0x427FD2: execpline (exec.c:1484)
==9333==    by 0x427756: execlist (exec.c:1267)
==9333==    by 0x42717C: execode (exec.c:1073)
==9333==    by 0x431299: runshfunc (exec.c:5040)
==9333==    by 0x430E76: doshfunc (exec.c:4920)
==9333==    by 0x4302FB: execshfunc (exec.c:4557)
==9333==    by 0x42D8C1: execcmd (exec.c:3373)
==9333== 
==9333== 
==9333== 2 errors in context 2 of 2:
==9333== Conditional jump or move depends on uninitialised value(s)
==9333==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9333==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9333==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9333==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9333==    by 0x42D8E9: execcmd (exec.c:3378)
==9333==    by 0x428CA0: execpline2 (exec.c:1697)
==9333==    by 0x427FD2: execpline (exec.c:1484)
==9333==    by 0x42779A: execlist (exec.c:1275)
==9333==    by 0x42717C: execode (exec.c:1073)
==9333==    by 0x431299: runshfunc (exec.c:5040)
==9333==    by 0x430E76: doshfunc (exec.c:4920)
==9333==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9333== 
==9333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9332-- Caught __NR_exit; running __libc_freeres()
--9332-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9332== 
==9332== HEAP SUMMARY:
==9332==     in use at exit: 3,153,904 bytes in 68,972 blocks
==9332==   total heap usage: 928,597 allocs, 859,625 frees, 65,653,653 bytes allocated
==9332== 
==9332== Searching for pointers to 68,972 not-freed blocks
--9332--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9332--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9332--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9332--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9332--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9332--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9332--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9332--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9332--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9332--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9332--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9332--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9332--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9332--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9332--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9332--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9332--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9332--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9332--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9332--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9332--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9332--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9332--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9332--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9332--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9332--   Scanning root segment: 0x701a000..0x701afff (4096)
--9332--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9332--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9332--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9332--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9332--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9332--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9332--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9332--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9332--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9332== Checked 4,887,696 bytes
==9332== 
==9332== LEAK SUMMARY:
==9332==    definitely lost: 1,533 bytes in 8 blocks
==9332==    indirectly lost: 6,756 bytes in 7 blocks
==9332==      possibly lost: 0 bytes in 0 blocks
==9332==    still reachable: 3,145,615 bytes in 68,957 blocks
==9332==         suppressed: 0 bytes in 0 blocks
==9332== Rerun with --leak-check=full to see details of leaked memory
==9332== 
==9332== Use --track-origins=yes to see where uninitialised values come from
==9332== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9332== 
==9332== 1 errors in context 1 of 2:
==9332== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9332==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9332==    by 0x488CD0: stringsubst (subst.c:301)
==9332==    by 0x48801B: prefork (subst.c:77)
==9332==    by 0x42B318: execcmd (exec.c:2619)
==9332==    by 0x428CA0: execpline2 (exec.c:1697)
==9332==    by 0x427FD2: execpline (exec.c:1484)
==9332==    by 0x427756: execlist (exec.c:1267)
==9332==    by 0x42717C: execode (exec.c:1073)
==9332==    by 0x431299: runshfunc (exec.c:5040)
==9332==    by 0x430E76: doshfunc (exec.c:4920)
==9332==    by 0x4302FB: execshfunc (exec.c:4557)
==9332==    by 0x42D8C1: execcmd (exec.c:3373)
==9332== 
==9332== 
==9332== 2 errors in context 2 of 2:
==9332== Conditional jump or move depends on uninitialised value(s)
==9332==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9332==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9332==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9332==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9332==    by 0x42D8E9: execcmd (exec.c:3378)
==9332==    by 0x428CA0: execpline2 (exec.c:1697)
==9332==    by 0x427FD2: execpline (exec.c:1484)
==9332==    by 0x42779A: execlist (exec.c:1275)
==9332==    by 0x42717C: execode (exec.c:1073)
==9332==    by 0x431299: runshfunc (exec.c:5040)
==9332==    by 0x430E76: doshfunc (exec.c:4920)
==9332==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9332== 
==9332== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9334-by-pythonnut-on-???
==9334== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9334-by-pythonnut-on-???
==9334== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9334-by-pythonnut-on-???
==9334== 
==9334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9334== don't want to do, unless you know exactly what you're doing,
==9334== or are doing some strange experiment):
==9334==   /usr/lib/valgrind/../../bin/vgdb --pid=9334 ...command...
==9334== 
==9334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9334==   /path/to/gdb ./zsh
==9334== and then give GDB the following command
==9334==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9334
==9334== --pid is optional if only one valgrind process is running
==9334== 
--9334-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1DAC,  len 4
--9334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9335-- Caught __NR_exit; running __libc_freeres()
==9334== 
==9334== HEAP SUMMARY:
==9334==     in use at exit: 3,117,696 bytes in 68,972 blocks
==9334==   total heap usage: 928,569 allocs, 859,597 frees, 65,648,328 bytes allocated
==9334== 
==9335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9335-by-pythonnut-on-???
==9335== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9335-by-pythonnut-on-???
==9335== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9335-by-pythonnut-on-???
==9335== 
==9335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9335== don't want to do, unless you know exactly what you're doing,
==9335== or are doing some strange experiment):
==9335==   /usr/lib/valgrind/../../bin/vgdb --pid=9335 ...command...
==9335== 
==9335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9335==   /path/to/gdb ./zsh
==9335== and then give GDB the following command
==9335==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9335
==9335== --pid is optional if only one valgrind process is running
==9335== 
--9335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9335== 
==9334== Searching for pointers to 68,972 not-freed blocks
--9334--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9334--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9334--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9334--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9334--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9334--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9334--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9334--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9334--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9334--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9334--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9334--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9334--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9334--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9334--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9334--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9334--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9334--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9334--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9334--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9334--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9334--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9334--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9335== HEAP SUMMARY:
==9335==     in use at exit: 3,117,440 bytes in 68,972 blocks
==9335==   total heap usage: 928,575 allocs, 859,603 frees, 65,650,448 bytes allocated
==9335== 
--9334--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9334--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9334--   Scanning root segment: 0x701a000..0x701afff (4096)
--9334--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9334--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9334--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9334--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9334--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9334--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9334--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9334--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9334--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9335== Searching for pointers to 68,972 not-freed blocks
--9335--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9335--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9335--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9335--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9335--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9335--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9335--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9335--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9335--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9335--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9335--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9335--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9335--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9335--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9335--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9335--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9335--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9335--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9335--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9335--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9335--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9335--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9335--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9335--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9335--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9335--   Scanning root segment: 0x701a000..0x701afff (4096)
--9335--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9335--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9335--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9335--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9335--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9335--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9335--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9335--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9335--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9334== Checked 4,851,056 bytes
==9334== 
==9334== LEAK SUMMARY:
==9334==    definitely lost: 1,533 bytes in 8 blocks
==9334==    indirectly lost: 6,756 bytes in 7 blocks
==9334==      possibly lost: 0 bytes in 0 blocks
==9334==    still reachable: 3,109,407 bytes in 68,957 blocks
==9334==         suppressed: 0 bytes in 0 blocks
==9334== Rerun with --leak-check=full to see details of leaked memory
==9334== 
==9334== Use --track-origins=yes to see where uninitialised values come from
==9334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9334== 
==9334== 1 errors in context 1 of 2:
==9334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9334==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9334==    by 0x488CD0: stringsubst (subst.c:301)
==9334==    by 0x48801B: prefork (subst.c:77)
==9334==    by 0x42B318: execcmd (exec.c:2619)
==9334==    by 0x428CA0: execpline2 (exec.c:1697)
==9334==    by 0x427FD2: execpline (exec.c:1484)
==9334==    by 0x427756: execlist (exec.c:1267)
==9334==    by 0x42717C: execode (exec.c:1073)
==9334==    by 0x431299: runshfunc (exec.c:5040)
==9334==    by 0x430E76: doshfunc (exec.c:4920)
==9334==    by 0x4302FB: execshfunc (exec.c:4557)
==9334==    by 0x42D8C1: execcmd (exec.c:3373)
==9334== 
==9334== 
==9334== 2 errors in context 2 of 2:
==9334== Conditional jump or move depends on uninitialised value(s)
==9334==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9334==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9334==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9334==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9334==    by 0x42D8E9: execcmd (exec.c:3378)
==9334==    by 0x428CA0: execpline2 (exec.c:1697)
==9334==    by 0x427FD2: execpline (exec.c:1484)
==9334==    by 0x42779A: execlist (exec.c:1275)
==9334==    by 0x42717C: execode (exec.c:1073)
==9334==    by 0x431299: runshfunc (exec.c:5040)
==9334==    by 0x430E76: doshfunc (exec.c:4920)
==9334==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9334== 
==9334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9335== Checked 4,850,904 bytes
==9335== 
==9335== LEAK SUMMARY:
==9335==    definitely lost: 1,557 bytes in 9 blocks
==9335==    indirectly lost: 6,796 bytes in 9 blocks
==9335==      possibly lost: 0 bytes in 0 blocks
==9335==    still reachable: 3,109,087 bytes in 68,954 blocks
==9335==         suppressed: 0 bytes in 0 blocks
==9335== Rerun with --leak-check=full to see details of leaked memory
==9335== 
==9335== Use --track-origins=yes to see where uninitialised values come from
==9335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9335== 
==9335== 1 errors in context 1 of 2:
==9335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9335==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9335==    by 0x488CD0: stringsubst (subst.c:301)
==9335==    by 0x48801B: prefork (subst.c:77)
==9335==    by 0x42B318: execcmd (exec.c:2619)
==9335==    by 0x428CA0: execpline2 (exec.c:1697)
==9335==    by 0x427FD2: execpline (exec.c:1484)
==9335==    by 0x427756: execlist (exec.c:1267)
==9335==    by 0x42717C: execode (exec.c:1073)
==9335==    by 0x431299: runshfunc (exec.c:5040)
==9335==    by 0x430E76: doshfunc (exec.c:4920)
==9335==    by 0x4302FB: execshfunc (exec.c:4557)
==9335==    by 0x42D8C1: execcmd (exec.c:3373)
==9335== 
==9335== 
==9335== 2 errors in context 2 of 2:
==9335== Conditional jump or move depends on uninitialised value(s)
==9335==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9335==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9335==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9335==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9335==    by 0x42D8E9: execcmd (exec.c:3378)
==9335==    by 0x428CA0: execpline2 (exec.c:1697)
==9335==    by 0x427FD2: execpline (exec.c:1484)
==9335==    by 0x42779A: execlist (exec.c:1275)
==9335==    by 0x42717C: execode (exec.c:1073)
==9335==    by 0x431299: runshfunc (exec.c:5040)
==9335==    by 0x430E76: doshfunc (exec.c:4920)
==9335==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9335== 
==9335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9339-by-pythonnut-on-???
==9339== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9339-by-pythonnut-on-???
==9339== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9339-by-pythonnut-on-???
==9339== 
==9339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9339== don't want to do, unless you know exactly what you're doing,
==9339== or are doing some strange experiment):
==9339==   /usr/lib/valgrind/../../bin/vgdb --pid=9339 ...command...
==9339== 
==9339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9339==   /path/to/gdb ./zsh
==9339== and then give GDB the following command
==9339==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9339
==9339== --pid is optional if only one valgrind process is running
==9339== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9321-- Caught __NR_exit; running __libc_freeres()
--9321-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9321== 
==9321== HEAP SUMMARY:
==9321==     in use at exit: 3,116,022 bytes in 68,949 blocks
==9321==   total heap usage: 928,576 allocs, 859,627 frees, 65,651,016 bytes allocated
==9321== 
==9321== Searching for pointers to 68,949 not-freed blocks
--9321--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9321--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9321--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9321--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9321--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9321--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9321--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9321--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9321--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9321--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9321--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9321--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9321--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9321--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9321--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9321--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9321--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9321--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9321--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9321--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9321--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9321--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9321--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9321--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9321--   Scanning root segment: 0x701a000..0x701afff (4096)
--9321--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9321--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9321--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9321--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9321--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9321--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9321--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9321--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9321--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9321== Checked 4,757,304 bytes
==9321== 
==9321== LEAK SUMMARY:
==9321==    definitely lost: 1,533 bytes in 8 blocks
==9321==    indirectly lost: 6,756 bytes in 7 blocks
==9321==      possibly lost: 0 bytes in 0 blocks
==9321==    still reachable: 3,107,733 bytes in 68,934 blocks
==9321==         suppressed: 0 bytes in 0 blocks
==9321== Rerun with --leak-check=full to see details of leaked memory
==9321== 
==9321== Use --track-origins=yes to see where uninitialised values come from
==9321== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9321== 
==9321== 1 errors in context 1 of 2:
==9321== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9321==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9321==    by 0x488CD0: stringsubst (subst.c:301)
==9321==    by 0x48801B: prefork (subst.c:77)
==9321==    by 0x42B318: execcmd (exec.c:2619)
==9321==    by 0x428CA0: execpline2 (exec.c:1697)
==9321==    by 0x427FD2: execpline (exec.c:1484)
==9321==    by 0x427756: execlist (exec.c:1267)
==9321==    by 0x42717C: execode (exec.c:1073)
==9321==    by 0x431299: runshfunc (exec.c:5040)
==9321==    by 0x430E76: doshfunc (exec.c:4920)
==9321==    by 0x4302FB: execshfunc (exec.c:4557)
==9321==    by 0x42D8C1: execcmd (exec.c:3373)
==9321== 
==9321== 
==9321== 2 errors in context 2 of 2:
==9321== Conditional jump or move depends on uninitialised value(s)
==9321==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9321==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9321==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9321==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9321==    by 0x42D8E9: execcmd (exec.c:3378)
==9321==    by 0x428CA0: execpline2 (exec.c:1697)
==9321==    by 0x427FD2: execpline (exec.c:1484)
==9321==    by 0x42779A: execlist (exec.c:1275)
==9321==    by 0x42717C: execode (exec.c:1073)
==9321==    by 0x431299: runshfunc (exec.c:5040)
==9321==    by 0x430E76: doshfunc (exec.c:4920)
==9321==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9321== 
==9321== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9341-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF305C,  len 4
==9341== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9341-by-pythonnut-on-???
==9341== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9341-by-pythonnut-on-???
==9341== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9341-by-pythonnut-on-???
==9341== 
==9341== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9341== don't want to do, unless you know exactly what you're doing,
==9341== or are doing some strange experiment):
==9341==   /usr/lib/valgrind/../../bin/vgdb --pid=9341 ...command...
==9341== 
==9341== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9341==   /path/to/gdb ./zsh
==9341== and then give GDB the following command
==9341==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9341
==9341== --pid is optional if only one valgrind process is running
==9341== 
client request: code 4d430005,  addr 0xFFEFF2FBC,  len 4
--9341-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9341== 
==9341== HEAP SUMMARY:
==9341==     in use at exit: 3,116,350 bytes in 68,950 blocks
==9341==   total heap usage: 928,521 allocs, 859,571 frees, 65,600,302 bytes allocated
==9341== 
==9341== Searching for pointers to 68,950 not-freed blocks
--9341--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9341--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9341--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9341--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9341--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9341--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9341--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9341--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9341--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9341--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9341--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9341--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9341--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9341--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9341--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9341--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9341--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9341--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9341--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9341--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9341--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9341--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9341--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9341--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9341--   Scanning root segment: 0x701a000..0x701afff (4096)
--9341--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9341--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9341--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9341--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9341--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9341--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9341--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9341--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9341--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9341== Checked 4,758,840 bytes
==9341== 
==9341== LEAK SUMMARY:
==9341==    definitely lost: 1,533 bytes in 8 blocks
==9341==    indirectly lost: 6,756 bytes in 7 blocks
==9341==      possibly lost: 0 bytes in 0 blocks
==9341==    still reachable: 3,108,061 bytes in 68,935 blocks
==9341==         suppressed: 0 bytes in 0 blocks
==9341== Rerun with --leak-check=full to see details of leaked memory
==9341== 
==9341== Use --track-origins=yes to see where uninitialised values come from
==9341== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9341== 
==9341== 1 errors in context 1 of 2:
==9341== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9341==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9341==    by 0x488CD0: stringsubst (subst.c:301)
==9341==    by 0x48801B: prefork (subst.c:77)
==9341==    by 0x42B318: execcmd (exec.c:2619)
==9341==    by 0x428CA0: execpline2 (exec.c:1697)
==9341==    by 0x427FD2: execpline (exec.c:1484)
==9341==    by 0x427756: execlist (exec.c:1267)
==9341==    by 0x42717C: execode (exec.c:1073)
==9341==    by 0x431299: runshfunc (exec.c:5040)
==9341==    by 0x430E76: doshfunc (exec.c:4920)
==9341==    by 0x4302FB: execshfunc (exec.c:4557)
==9341==    by 0x42D8C1: execcmd (exec.c:3373)
==9341== 
==9341== 
==9341== 2 errors in context 2 of 2:
==9341== Conditional jump or move depends on uninitialised value(s)
==9341==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9341==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9341==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9341==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9341==    by 0x42D8E9: execcmd (exec.c:3378)
==9341==    by 0x428CA0: execpline2 (exec.c:1697)
==9341==    by 0x427FD2: execpline (exec.c:1484)
==9341==    by 0x42779A: execlist (exec.c:1275)
==9341==    by 0x42717C: execode (exec.c:1073)
==9341==    by 0x431299: runshfunc (exec.c:5040)
==9341==    by 0x430E76: doshfunc (exec.c:4920)
==9341==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9341== 
==9341== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9340-- Caught __NR_exit; running __libc_freeres()
==9340== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9340-by-pythonnut-on-???
==9340== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9340-by-pythonnut-on-???
==9340== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9340-by-pythonnut-on-???
==9340== 
==9340== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9340== don't want to do, unless you know exactly what you're doing,
==9340== or are doing some strange experiment):
==9340==   /usr/lib/valgrind/../../bin/vgdb --pid=9340 ...command...
==9340== 
==9340== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9340==   /path/to/gdb ./zsh
==9340== and then give GDB the following command
==9340==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9340
==9340== --pid is optional if only one valgrind process is running
==9340== 
--9340-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9340== 
==9340== HEAP SUMMARY:
==9340==     in use at exit: 3,116,062 bytes in 68,947 blocks
==9340==   total heap usage: 928,527 allocs, 859,580 frees, 65,601,190 bytes allocated
==9340== 
==9340== Searching for pointers to 68,947 not-freed blocks
--9340--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9340--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9340--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9340--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9340--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9340--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9340--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9340--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9340--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9340--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9340--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9340--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9340--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9340--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9340--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9340--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9340--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9340--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9340--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9340--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9340--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9340--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9340--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9340--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9340--   Scanning root segment: 0x701a000..0x701afff (4096)
--9340--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9340--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9340--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9340--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9340--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9340--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9340--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9340--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9340--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9340== Checked 4,757,920 bytes
==9340== 
==9340== LEAK SUMMARY:
==9340==    definitely lost: 1,533 bytes in 8 blocks
==9340==    indirectly lost: 6,756 bytes in 7 blocks
==9340==      possibly lost: 0 bytes in 0 blocks
==9340==    still reachable: 3,107,773 bytes in 68,932 blocks
==9340==         suppressed: 0 bytes in 0 blocks
==9340== Rerun with --leak-check=full to see details of leaked memory
==9340== 
==9340== Use --track-origins=yes to see where uninitialised values come from
==9340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9340== 
==9340== 1 errors in context 1 of 2:
==9340== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9340==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9340==    by 0x488CD0: stringsubst (subst.c:301)
==9340==    by 0x48801B: prefork (subst.c:77)
==9340==    by 0x42B318: execcmd (exec.c:2619)
==9340==    by 0x428CA0: execpline2 (exec.c:1697)
==9340==    by 0x427FD2: execpline (exec.c:1484)
==9340==    by 0x427756: execlist (exec.c:1267)
==9340==    by 0x42717C: execode (exec.c:1073)
==9340==    by 0x431299: runshfunc (exec.c:5040)
==9340==    by 0x430E76: doshfunc (exec.c:4920)
==9340==    by 0x4302FB: execshfunc (exec.c:4557)
==9340==    by 0x42D8C1: execcmd (exec.c:3373)
==9340== 
==9340== 
==9340== 2 errors in context 2 of 2:
==9340== Conditional jump or move depends on uninitialised value(s)
==9340==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9340==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9340==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9340==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9340==    by 0x42D8E9: execcmd (exec.c:3378)
==9340==    by 0x428CA0: execpline2 (exec.c:1697)
==9340==    by 0x427FD2: execpline (exec.c:1484)
==9340==    by 0x42779A: execlist (exec.c:1275)
==9340==    by 0x42717C: execode (exec.c:1073)
==9340==    by 0x431299: runshfunc (exec.c:5040)
==9340==    by 0x430E76: doshfunc (exec.c:4920)
==9340==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9340== 
==9340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9345-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1BFC,  len 4
==9345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9345-by-pythonnut-on-???
==9345== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9345-by-pythonnut-on-???
==9345== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9345-by-pythonnut-on-???
==9345== 
==9345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9345== don't want to do, unless you know exactly what you're doing,
==9345== or are doing some strange experiment):
==9345==   /usr/lib/valgrind/../../bin/vgdb --pid=9345 ...command...
==9345== 
==9345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9345==   /path/to/gdb ./zsh
==9345== and then give GDB the following command
==9345==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9345
==9345== --pid is optional if only one valgrind process is running
==9345== 
client request: code 4d430005,  addr 0xFFEFF1B5C,  len 4
--9345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9345== 
==9345== HEAP SUMMARY:
==9345==     in use at exit: 3,116,272 bytes in 68,952 blocks
==9345==   total heap usage: 928,554 allocs, 859,602 frees, 65,613,491 bytes allocated
==9345== 
==9345== Searching for pointers to 68,952 not-freed blocks
--9345--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9345--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9345--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9345--   Scanning root segment: 0x4037000..0x403afff (16384)
--9345--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9345--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9345--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9345--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9345--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9345--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9345--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9345--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9345--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9345--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9345--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9345--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9345--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9345--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9345--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9345--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9345--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9345--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9345--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9345--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9345--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9345--   Scanning root segment: 0x701a000..0x701afff (4096)
--9345--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9345--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9345--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9345--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9345--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9345--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9345--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9345--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9345--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9345== Checked 4,776,448 bytes
==9345== 
==9345== LEAK SUMMARY:
==9345==    definitely lost: 1,533 bytes in 8 blocks
==9345==    indirectly lost: 6,756 bytes in 7 blocks
==9345==      possibly lost: 0 bytes in 0 blocks
==9345==    still reachable: 3,107,983 bytes in 68,937 blocks
==9345==         suppressed: 0 bytes in 0 blocks
==9345== Rerun with --leak-check=full to see details of leaked memory
==9345== 
==9345== Use --track-origins=yes to see where uninitialised values come from
==9345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9345== 
==9345== 1 errors in context 1 of 2:
==9345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9345==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9345==    by 0x488CD0: stringsubst (subst.c:301)
==9345==    by 0x48801B: prefork (subst.c:77)
==9345==    by 0x42B318: execcmd (exec.c:2619)
==9345==    by 0x428CA0: execpline2 (exec.c:1697)
==9345==    by 0x427FD2: execpline (exec.c:1484)
==9345==    by 0x427756: execlist (exec.c:1267)
==9345==    by 0x42717C: execode (exec.c:1073)
==9345==    by 0x431299: runshfunc (exec.c:5040)
==9345==    by 0x430E76: doshfunc (exec.c:4920)
==9345==    by 0x4302FB: execshfunc (exec.c:4557)
==9345==    by 0x42D8C1: execcmd (exec.c:3373)
==9345== 
==9345== 
==9345== 2 errors in context 2 of 2:
==9345== Conditional jump or move depends on uninitialised value(s)
==9345==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9345==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9345==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9345==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9345==    by 0x42D8E9: execcmd (exec.c:3378)
==9345==    by 0x428CA0: execpline2 (exec.c:1697)
==9345==    by 0x427FD2: execpline (exec.c:1484)
==9345==    by 0x42779A: execlist (exec.c:1275)
==9345==    by 0x42717C: execode (exec.c:1073)
==9345==    by 0x431299: runshfunc (exec.c:5040)
==9345==    by 0x430E76: doshfunc (exec.c:4920)
==9345==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9345== 
==9345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9344-- Caught __NR_exit; running __libc_freeres()
==9344== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9344-by-pythonnut-on-???
==9344== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9344-by-pythonnut-on-???
==9344== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9344-by-pythonnut-on-???
==9344== 
==9344== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9344== don't want to do, unless you know exactly what you're doing,
==9344== or are doing some strange experiment):
==9344==   /usr/lib/valgrind/../../bin/vgdb --pid=9344 ...command...
==9344== 
==9344== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9344==   /path/to/gdb ./zsh
==9344== and then give GDB the following command
==9344==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9344
==9344== --pid is optional if only one valgrind process is running
==9344== 
--9344-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9344== 
==9344== HEAP SUMMARY:
==9344==     in use at exit: 3,116,309 bytes in 68,953 blocks
==9344==   total heap usage: 928,550 allocs, 859,597 frees, 65,609,907 bytes allocated
==9344== 
==9344== Searching for pointers to 68,953 not-freed blocks
--9344--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9344--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9344--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9344--   Scanning root segment: 0x4037000..0x403afff (16384)
--9344--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9344--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9344--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9344--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9344--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9344--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9344--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9344--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9344--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9344--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9344--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9344--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9344--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9344--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9344--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9344--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9344--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9344--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9344--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9344--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9344--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9344--   Scanning root segment: 0x701a000..0x701afff (4096)
--9344--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9344--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9344--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9344--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9344--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9344--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9344--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9344--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9344--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9344== Checked 4,776,152 bytes
==9344== 
==9344== LEAK SUMMARY:
==9344==    definitely lost: 1,533 bytes in 8 blocks
==9344==    indirectly lost: 6,756 bytes in 7 blocks
==9344==      possibly lost: 0 bytes in 0 blocks
==9344==    still reachable: 3,108,020 bytes in 68,938 blocks
==9344==         suppressed: 0 bytes in 0 blocks
==9344== Rerun with --leak-check=full to see details of leaked memory
==9344== 
==9344== Use --track-origins=yes to see where uninitialised values come from
==9344== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9344== 
==9344== 1 errors in context 1 of 2:
==9344== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9344==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9344==    by 0x488CD0: stringsubst (subst.c:301)
==9344==    by 0x48801B: prefork (subst.c:77)
==9344==    by 0x42B318: execcmd (exec.c:2619)
==9344==    by 0x428CA0: execpline2 (exec.c:1697)
==9344==    by 0x427FD2: execpline (exec.c:1484)
==9344==    by 0x427756: execlist (exec.c:1267)
==9344==    by 0x42717C: execode (exec.c:1073)
==9344==    by 0x431299: runshfunc (exec.c:5040)
==9344==    by 0x430E76: doshfunc (exec.c:4920)
==9344==    by 0x4302FB: execshfunc (exec.c:4557)
==9344==    by 0x42D8C1: execcmd (exec.c:3373)
==9344== 
==9344== 
==9344== 2 errors in context 2 of 2:
==9344== Conditional jump or move depends on uninitialised value(s)
==9344==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9344==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9344==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9344==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9344==    by 0x42D8E9: execcmd (exec.c:3378)
==9344==    by 0x428CA0: execpline2 (exec.c:1697)
==9344==    by 0x427FD2: execpline (exec.c:1484)
==9344==    by 0x42779A: execlist (exec.c:1275)
==9344==    by 0x42717C: execode (exec.c:1073)
==9344==    by 0x431299: runshfunc (exec.c:5040)
==9344==    by 0x430E76: doshfunc (exec.c:4920)
==9344==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9344== 
==9344== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF214C,  len 4
--9348-- Caught __NR_exit; running __libc_freeres()
==9348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9348-by-pythonnut-on-???
==9348== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9348-by-pythonnut-on-???
==9348== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9348-by-pythonnut-on-???
==9348== 
==9348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9348== don't want to do, unless you know exactly what you're doing,
==9348== or are doing some strange experiment):
==9348==   /usr/lib/valgrind/../../bin/vgdb --pid=9348 ...command...
==9348== 
==9348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9348==   /path/to/gdb ./zsh
==9348== and then give GDB the following command
==9348==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9348
==9348== --pid is optional if only one valgrind process is running
==9348== 
--9348-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9348== 
==9348== HEAP SUMMARY:
==9348==     in use at exit: 3,116,653 bytes in 68,958 blocks
==9348==   total heap usage: 928,562 allocs, 859,604 frees, 65,615,233 bytes allocated
==9348== 
==9348== Searching for pointers to 68,958 not-freed blocks
--9348--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9348--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9348--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9348--   Scanning root segment: 0x4037000..0x403afff (16384)
--9348--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9348--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9348--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9348--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9348--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9348--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9348--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9348--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9348--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9348--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9348--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9348--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9348--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9348--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9348--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9348--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9348--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9348--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9348--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9348--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9348--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9348--   Scanning root segment: 0x701a000..0x701afff (4096)
--9348--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9348--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9348--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9348--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9348--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9348--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9348--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9348--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9348--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9348== Checked 4,776,216 bytes
==9348== 
==9348== LEAK SUMMARY:
==9348==    definitely lost: 1,533 bytes in 8 blocks
==9348==    indirectly lost: 6,756 bytes in 7 blocks
==9348==      possibly lost: 0 bytes in 0 blocks
==9348==    still reachable: 3,108,364 bytes in 68,943 blocks
==9348==         suppressed: 0 bytes in 0 blocks
==9348== Rerun with --leak-check=full to see details of leaked memory
==9348== 
==9348== Use --track-origins=yes to see where uninitialised values come from
==9348== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9348== 
==9348== 1 errors in context 1 of 2:
==9348== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9348==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9348==    by 0x488CD0: stringsubst (subst.c:301)
==9348==    by 0x48801B: prefork (subst.c:77)
==9348==    by 0x42B318: execcmd (exec.c:2619)
==9348==    by 0x428CA0: execpline2 (exec.c:1697)
==9348==    by 0x427FD2: execpline (exec.c:1484)
==9348==    by 0x427756: execlist (exec.c:1267)
==9348==    by 0x42717C: execode (exec.c:1073)
==9348==    by 0x431299: runshfunc (exec.c:5040)
==9348==    by 0x430E76: doshfunc (exec.c:4920)
==9348==    by 0x4302FB: execshfunc (exec.c:4557)
==9348==    by 0x42D8C1: execcmd (exec.c:3373)
==9348== 
==9348== 
==9348== 2 errors in context 2 of 2:
==9348== Conditional jump or move depends on uninitialised value(s)
==9348==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9348==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9348==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9348==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9348==    by 0x42D8E9: execcmd (exec.c:3378)
==9348==    by 0x428CA0: execpline2 (exec.c:1697)
==9348==    by 0x427FD2: execpline (exec.c:1484)
==9348==    by 0x42779A: execlist (exec.c:1275)
==9348==    by 0x42717C: execode (exec.c:1073)
==9348==    by 0x431299: runshfunc (exec.c:5040)
==9348==    by 0x430E76: doshfunc (exec.c:4920)
==9348==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9348== 
==9348== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1C9C,  len 4
--9352-- Caught __NR_exit; running __libc_freeres()
==9352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9352-by-pythonnut-on-???
==9352== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9352-by-pythonnut-on-???
==9352== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9352-by-pythonnut-on-???
==9352== 
==9352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9352== don't want to do, unless you know exactly what you're doing,
==9352== or are doing some strange experiment):
==9352==   /usr/lib/valgrind/../../bin/vgdb --pid=9352 ...command...
==9352== 
==9352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9352==   /path/to/gdb ./zsh
==9352== and then give GDB the following command
==9352==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9352
==9352== --pid is optional if only one valgrind process is running
==9352== 
--9352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9352== 
==9352== HEAP SUMMARY:
==9352==     in use at exit: 3,116,682 bytes in 68,959 blocks
==9352==   total heap usage: 928,567 allocs, 859,608 frees, 65,617,374 bytes allocated
==9352== 
==9352== Searching for pointers to 68,959 not-freed blocks
--9352--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9352--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9352--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9352--   Scanning root segment: 0x4037000..0x403afff (16384)
--9352--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9352--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9352--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9352--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9352--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9352--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9352--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9352--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9352--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9352--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9352--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9352--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9352--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9352--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9352--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9352--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9352--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9352--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9352--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9352--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9352--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9352--   Scanning root segment: 0x701a000..0x701afff (4096)
--9352--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9352--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9352--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9352--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9352--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9352--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9352--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9352--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9352--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9352== Checked 4,776,512 bytes
==9352== 
==9352== LEAK SUMMARY:
==9352==    definitely lost: 1,533 bytes in 8 blocks
==9352==    indirectly lost: 6,756 bytes in 7 blocks
==9352==      possibly lost: 0 bytes in 0 blocks
==9352==    still reachable: 3,108,393 bytes in 68,944 blocks
==9352==         suppressed: 0 bytes in 0 blocks
==9352== Rerun with --leak-check=full to see details of leaked memory
==9352== 
==9352== Use --track-origins=yes to see where uninitialised values come from
==9352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9352== 
==9352== 1 errors in context 1 of 2:
==9352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9352==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9352==    by 0x488CD0: stringsubst (subst.c:301)
==9352==    by 0x48801B: prefork (subst.c:77)
==9352==    by 0x42B318: execcmd (exec.c:2619)
==9352==    by 0x428CA0: execpline2 (exec.c:1697)
==9352==    by 0x427FD2: execpline (exec.c:1484)
==9352==    by 0x427756: execlist (exec.c:1267)
==9352==    by 0x42717C: execode (exec.c:1073)
==9352==    by 0x431299: runshfunc (exec.c:5040)
==9352==    by 0x430E76: doshfunc (exec.c:4920)
==9352==    by 0x4302FB: execshfunc (exec.c:4557)
==9352==    by 0x42D8C1: execcmd (exec.c:3373)
==9352== 
==9352== 
==9352== 2 errors in context 2 of 2:
==9352== Conditional jump or move depends on uninitialised value(s)
==9352==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9352==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9352==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9352==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9352==    by 0x42D8E9: execcmd (exec.c:3378)
==9352==    by 0x428CA0: execpline2 (exec.c:1697)
==9352==    by 0x427FD2: execpline (exec.c:1484)
==9352==    by 0x42779A: execlist (exec.c:1275)
==9352==    by 0x42717C: execode (exec.c:1073)
==9352==    by 0x431299: runshfunc (exec.c:5040)
==9352==    by 0x430E76: doshfunc (exec.c:4920)
==9352==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9352== 
==9352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF261C,  len 4
client request: code 4d430005,  addr 0xFFEFF1F9C,  len 4
--9320-- Caught __NR_exit; running __libc_freeres()
--9320-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9320== 
==9320== HEAP SUMMARY:
==9320==     in use at exit: 3,114,682 bytes in 68,911 blocks
==9320==   total heap usage: 928,576 allocs, 859,665 frees, 65,621,314 bytes allocated
==9320== 
==9320== Searching for pointers to 68,911 not-freed blocks
--9320--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9320--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9320--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9320--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9320--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9320--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9320--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9320--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9320--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9320--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9320--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9320--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9320--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9320--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9320--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9320--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9320--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9320--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9320--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9320--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9320--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9320--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9320--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9320--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9320--   Scanning root segment: 0x701a000..0x701afff (4096)
--9320--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9320--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9320--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9320--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9320--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9320--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9320--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9320--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9320--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9320== Checked 4,754,216 bytes
==9320== 
==9320== LEAK SUMMARY:
==9320==    definitely lost: 1,533 bytes in 8 blocks
==9320==    indirectly lost: 6,756 bytes in 7 blocks
==9320==      possibly lost: 0 bytes in 0 blocks
==9320==    still reachable: 3,106,393 bytes in 68,896 blocks
==9320==         suppressed: 0 bytes in 0 blocks
==9320== Rerun with --leak-check=full to see details of leaked memory
==9320== 
==9320== Use --track-origins=yes to see where uninitialised values come from
==9320== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9320== 
==9320== 1 errors in context 1 of 2:
==9320== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9320==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9320==    by 0x488CD0: stringsubst (subst.c:301)
==9320==    by 0x48801B: prefork (subst.c:77)
==9320==    by 0x42B318: execcmd (exec.c:2619)
==9320==    by 0x428CA0: execpline2 (exec.c:1697)
==9320==    by 0x427FD2: execpline (exec.c:1484)
==9320==    by 0x427756: execlist (exec.c:1267)
==9320==    by 0x42717C: execode (exec.c:1073)
==9320==    by 0x431299: runshfunc (exec.c:5040)
==9320==    by 0x430E76: doshfunc (exec.c:4920)
==9320==    by 0x4302FB: execshfunc (exec.c:4557)
==9320==    by 0x42D8C1: execcmd (exec.c:3373)
==9320== 
==9320== 
==9320== 2 errors in context 2 of 2:
==9320== Conditional jump or move depends on uninitialised value(s)
==9320==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9320==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9320==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9320==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9320==    by 0x42D8E9: execcmd (exec.c:3378)
==9320==    by 0x428CA0: execpline2 (exec.c:1697)
==9320==    by 0x427FD2: execpline (exec.c:1484)
==9320==    by 0x42779A: execlist (exec.c:1275)
==9320==    by 0x42717C: execode (exec.c:1073)
==9320==    by 0x431299: runshfunc (exec.c:5040)
==9320==    by 0x430E76: doshfunc (exec.c:4920)
==9320==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9320== 
==9320== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9356== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9356-by-pythonnut-on-???
==9356== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9356-by-pythonnut-on-???
==9356== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9356-by-pythonnut-on-???
==9356== 
==9356== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9356== don't want to do, unless you know exactly what you're doing,
==9356== or are doing some strange experiment):
==9356==   /usr/lib/valgrind/../../bin/vgdb --pid=9356 ...command...
==9356== 
==9356== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9356==   /path/to/gdb ./zsh
==9356== and then give GDB the following command
==9356==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9356
==9356== --pid is optional if only one valgrind process is running
==9356== 
==9357== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9357-by-pythonnut-on-???
==9357== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9357-by-pythonnut-on-???
==9357== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9357-by-pythonnut-on-???
==9357== 
==9357== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9357== don't want to do, unless you know exactly what you're doing,
==9357== or are doing some strange experiment):
==9357==   /usr/lib/valgrind/../../bin/vgdb --pid=9357 ...command...
==9357== 
==9357== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9357==   /path/to/gdb ./zsh
==9357== and then give GDB the following command
==9357==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9357
==9357== --pid is optional if only one valgrind process is running
==9357== 
client request: code 4d430005,  addr 0xFFEFF07BC,  len 4
==9358== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9358-by-pythonnut-on-???
==9358== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9358-by-pythonnut-on-???
==9358== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9358-by-pythonnut-on-???
==9358== 
==9358== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9358== don't want to do, unless you know exactly what you're doing,
==9358== or are doing some strange experiment):
==9358==   /usr/lib/valgrind/../../bin/vgdb --pid=9358 ...command...
==9358== 
==9358== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9358==   /path/to/gdb ./zsh
==9358== and then give GDB the following command
==9358==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9358
==9358== --pid is optional if only one valgrind process is running
==9358== 
--9358-- Caught __NR_exit; running __libc_freeres()
--9358-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9358== 
==9358== HEAP SUMMARY:
==9358==     in use at exit: 3,116,493 bytes in 68,958 blocks
==9358==   total heap usage: 928,535 allocs, 859,577 frees, 65,599,493 bytes allocated
==9358== 
==9358== Searching for pointers to 68,958 not-freed blocks
--9358--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9358--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9358--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9358--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9358--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9358--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9358--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9358--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9358--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9358--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9358--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9358--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9358--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9358--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9358--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9358--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9358--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9358--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9358--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9358--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9358--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9358--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9358--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9358--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9358--   Scanning root segment: 0x701a000..0x701afff (4096)
--9358--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9358--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9358--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9358--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9358--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9358--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9358--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9358--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9358--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9358== Checked 4,760,024 bytes
==9358== 
==9358== LEAK SUMMARY:
==9358==    definitely lost: 1,533 bytes in 8 blocks
==9358==    indirectly lost: 6,756 bytes in 7 blocks
==9358==      possibly lost: 0 bytes in 0 blocks
==9358==    still reachable: 3,108,204 bytes in 68,943 blocks
==9358==         suppressed: 0 bytes in 0 blocks
==9358== Rerun with --leak-check=full to see details of leaked memory
==9358== 
==9358== Use --track-origins=yes to see where uninitialised values come from
==9358== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9358== 
==9358== 1 errors in context 1 of 2:
==9358== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9358==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9358==    by 0x488CD0: stringsubst (subst.c:301)
==9358==    by 0x48801B: prefork (subst.c:77)
==9358==    by 0x42B318: execcmd (exec.c:2619)
==9358==    by 0x428CA0: execpline2 (exec.c:1697)
==9358==    by 0x427FD2: execpline (exec.c:1484)
==9358==    by 0x427756: execlist (exec.c:1267)
==9358==    by 0x42717C: execode (exec.c:1073)
==9358==    by 0x431299: runshfunc (exec.c:5040)
==9358==    by 0x430E76: doshfunc (exec.c:4920)
==9358==    by 0x4302FB: execshfunc (exec.c:4557)
==9358==    by 0x42D8C1: execcmd (exec.c:3373)
==9358== 
==9358== 
==9358== 2 errors in context 2 of 2:
==9358== Conditional jump or move depends on uninitialised value(s)
==9358==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9358==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9358==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9358==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9358==    by 0x42D8E9: execcmd (exec.c:3378)
==9358==    by 0x428CA0: execpline2 (exec.c:1697)
==9358==    by 0x427FD2: execpline (exec.c:1484)
==9358==    by 0x42779A: execlist (exec.c:1275)
==9358==    by 0x42717C: execode (exec.c:1073)
==9358==    by 0x431299: runshfunc (exec.c:5040)
==9358==    by 0x430E76: doshfunc (exec.c:4920)
==9358==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9358== 
==9358== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9361-- Caught __NR_exit; running __libc_freeres()
==9361== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9361-by-pythonnut-on-???
==9361== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9361-by-pythonnut-on-???
==9361== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9361-by-pythonnut-on-???
==9361== 
==9361== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9361== don't want to do, unless you know exactly what you're doing,
==9361== or are doing some strange experiment):
==9361==   /usr/lib/valgrind/../../bin/vgdb --pid=9361 ...command...
==9361== 
==9361== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9361==   /path/to/gdb ./zsh
==9361== and then give GDB the following command
==9361==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9361
==9361== --pid is optional if only one valgrind process is running
==9361== 
==9362== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9362-by-pythonnut-on-???
==9362== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9362-by-pythonnut-on-???
==9362== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9362-by-pythonnut-on-???
==9362== 
==9362== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9362== don't want to do, unless you know exactly what you're doing,
==9362== or are doing some strange experiment):
==9362==   /usr/lib/valgrind/../../bin/vgdb --pid=9362 ...command...
==9362== 
==9362== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9362==   /path/to/gdb ./zsh
==9362== and then give GDB the following command
==9362==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9362
==9362== --pid is optional if only one valgrind process is running
==9362== 
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9361-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9361== 
==9361== HEAP SUMMARY:
==9361==     in use at exit: 3,153,384 bytes in 68,966 blocks
==9361==   total heap usage: 928,543 allocs, 859,577 frees, 65,639,440 bytes allocated
==9361== 
==9361== Searching for pointers to 68,966 not-freed blocks
--9361--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9361--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9361--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9361--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9361--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9361--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9361--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9361--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9361--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9361--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9361--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9361--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9361--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9361--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9361--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9361--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9361--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9361--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9361--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9361--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9361--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9361--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9361--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9361--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9361--   Scanning root segment: 0x701a000..0x701afff (4096)
--9361--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9361--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9361--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9361--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9361--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9361--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9361--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9361--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9361--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9361== Checked 4,871,832 bytes
==9361== 
==9361== LEAK SUMMARY:
==9361==    definitely lost: 1,533 bytes in 8 blocks
==9361==    indirectly lost: 6,756 bytes in 7 blocks
==9361==      possibly lost: 0 bytes in 0 blocks
==9361==    still reachable: 3,145,095 bytes in 68,951 blocks
==9361==         suppressed: 0 bytes in 0 blocks
==9361== Rerun with --leak-check=full to see details of leaked memory
==9361== 
==9361== Use --track-origins=yes to see where uninitialised values come from
==9361== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9361== 
==9361== 1 errors in context 1 of 2:
==9361== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9361==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9361==    by 0x488CD0: stringsubst (subst.c:301)
==9361==    by 0x48801B: prefork (subst.c:77)
==9361==    by 0x42B318: execcmd (exec.c:2619)
==9361==    by 0x428CA0: execpline2 (exec.c:1697)
==9361==    by 0x427FD2: execpline (exec.c:1484)
==9361==    by 0x427756: execlist (exec.c:1267)
==9361==    by 0x42717C: execode (exec.c:1073)
==9361==    by 0x431299: runshfunc (exec.c:5040)
==9361==    by 0x430E76: doshfunc (exec.c:4920)
==9361==    by 0x4302FB: execshfunc (exec.c:4557)
==9361==    by 0x42D8C1: execcmd (exec.c:3373)
==9361== 
==9361== 
==9361== 2 errors in context 2 of 2:
==9361== Conditional jump or move depends on uninitialised value(s)
==9361==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9361==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9361==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9361==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9361==    by 0x42D8E9: execcmd (exec.c:3378)
==9361==    by 0x428CA0: execpline2 (exec.c:1697)
==9361==    by 0x427FD2: execpline (exec.c:1484)
==9361==    by 0x42779A: execlist (exec.c:1275)
==9361==    by 0x42717C: execode (exec.c:1073)
==9361==    by 0x431299: runshfunc (exec.c:5040)
==9361==    by 0x430E76: doshfunc (exec.c:4920)
==9361==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9361== 
==9361== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9360== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9360-by-pythonnut-on-???
==9360== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9360-by-pythonnut-on-???
==9360== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9360-by-pythonnut-on-???
==9360== 
==9360== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9360== don't want to do, unless you know exactly what you're doing,
==9360== or are doing some strange experiment):
==9360==   /usr/lib/valgrind/../../bin/vgdb --pid=9360 ...command...
==9360== 
==9360== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9360==   /path/to/gdb ./zsh
==9360== and then give GDB the following command
==9360==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9360
==9360== --pid is optional if only one valgrind process is running
==9360== 
--9360-- Caught __NR_exit; running __libc_freeres()
--9360-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9360== 
==9360== HEAP SUMMARY:
==9360==     in use at exit: 3,153,320 bytes in 68,963 blocks
==9360==   total heap usage: 928,545 allocs, 859,582 frees, 65,639,984 bytes allocated
==9360== 
==9360== Searching for pointers to 68,963 not-freed blocks
--9360--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9360--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9360--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9360--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9360--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9360--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9360--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9360--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9360--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9360--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9360--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9360--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9360--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9360--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9360--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9360--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9360--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9360--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9360--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9360--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9360--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9360--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9360--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9360--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9360--   Scanning root segment: 0x701a000..0x701afff (4096)
--9360--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9360--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9360--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9360--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9360--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9360--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9360--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9360--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9360--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9360== Checked 4,871,168 bytes
==9360== 
==9360== LEAK SUMMARY:
==9360==    definitely lost: 1,533 bytes in 8 blocks
==9360==    indirectly lost: 6,756 bytes in 7 blocks
==9360==      possibly lost: 0 bytes in 0 blocks
==9360==    still reachable: 3,145,031 bytes in 68,948 blocks
==9360==         suppressed: 0 bytes in 0 blocks
==9360== Rerun with --leak-check=full to see details of leaked memory
==9360== 
==9360== Use --track-origins=yes to see where uninitialised values come from
==9360== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9360== 
==9360== 1 errors in context 1 of 2:
==9360== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9360==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9360==    by 0x488CD0: stringsubst (subst.c:301)
==9360==    by 0x48801B: prefork (subst.c:77)
==9360==    by 0x42B318: execcmd (exec.c:2619)
==9360==    by 0x428CA0: execpline2 (exec.c:1697)
==9360==    by 0x427FD2: execpline (exec.c:1484)
==9360==    by 0x427756: execlist (exec.c:1267)
==9360==    by 0x42717C: execode (exec.c:1073)
==9360==    by 0x431299: runshfunc (exec.c:5040)
==9360==    by 0x430E76: doshfunc (exec.c:4920)
==9360==    by 0x4302FB: execshfunc (exec.c:4557)
==9360==    by 0x42D8C1: execcmd (exec.c:3373)
==9360== 
==9360== 
==9360== 2 errors in context 2 of 2:
==9360== Conditional jump or move depends on uninitialised value(s)
==9360==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9360==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9360==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9360==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9360==    by 0x42D8E9: execcmd (exec.c:3378)
==9360==    by 0x428CA0: execpline2 (exec.c:1697)
==9360==    by 0x427FD2: execpline (exec.c:1484)
==9360==    by 0x42779A: execlist (exec.c:1275)
==9360==    by 0x42717C: execode (exec.c:1073)
==9360==    by 0x431299: runshfunc (exec.c:5040)
==9360==    by 0x430E76: doshfunc (exec.c:4920)
==9360==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9360== 
==9360== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9365== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9365-by-pythonnut-on-???
==9365== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9365-by-pythonnut-on-???
==9365== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9365-by-pythonnut-on-???
==9365== 
==9365== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9365== don't want to do, unless you know exactly what you're doing,
==9365== or are doing some strange experiment):
==9365==   /usr/lib/valgrind/../../bin/vgdb --pid=9365 ...command...
==9365== 
==9365== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9365==   /path/to/gdb ./zsh
==9365== and then give GDB the following command
==9365==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9365
==9365== --pid is optional if only one valgrind process is running
==9365== 
==9366== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9366-by-pythonnut-on-???
==9366== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9366-by-pythonnut-on-???
==9366== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9366-by-pythonnut-on-???
==9366== 
==9366== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9366== don't want to do, unless you know exactly what you're doing,
==9366== or are doing some strange experiment):
==9366==   /usr/lib/valgrind/../../bin/vgdb --pid=9366 ...command...
==9366== 
==9366== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9366==   /path/to/gdb ./zsh
==9366== and then give GDB the following command
==9366==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9366
==9366== --pid is optional if only one valgrind process is running
==9366== 
--9366-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9366-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9366== 
==9366== HEAP SUMMARY:
==9366==     in use at exit: 3,190,030 bytes in 68,969 blocks
==9366==   total heap usage: 928,552 allocs, 859,583 frees, 65,678,267 bytes allocated
==9366== 
==9366== Searching for pointers to 68,969 not-freed blocks
--9366--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9366--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9366--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9366--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9366--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9366--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9366--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9366--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9366--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9366--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9366--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9366--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9366--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9366--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9366--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9366--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9366--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9366--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9366--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9366--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9366--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9366--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9366--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9366--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9366--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9366--   Scanning root segment: 0x701a000..0x701afff (4096)
--9366--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9366--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9366--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9366--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9366--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9366--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9366--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9366--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9366--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9366== Checked 4,945,352 bytes
==9366== 
==9366== LEAK SUMMARY:
==9366==    definitely lost: 1,533 bytes in 8 blocks
==9366==    indirectly lost: 6,756 bytes in 7 blocks
==9366==      possibly lost: 0 bytes in 0 blocks
==9366==    still reachable: 3,181,741 bytes in 68,954 blocks
==9366==         suppressed: 0 bytes in 0 blocks
==9366== Rerun with --leak-check=full to see details of leaked memory
==9366== 
==9366== Use --track-origins=yes to see where uninitialised values come from
==9366== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9366== 
==9366== 1 errors in context 1 of 2:
==9366== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9366==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9366==    by 0x488CD0: stringsubst (subst.c:301)
==9366==    by 0x48801B: prefork (subst.c:77)
==9366==    by 0x42B318: execcmd (exec.c:2619)
==9366==    by 0x428CA0: execpline2 (exec.c:1697)
==9366==    by 0x427FD2: execpline (exec.c:1484)
==9366==    by 0x427756: execlist (exec.c:1267)
==9366==    by 0x42717C: execode (exec.c:1073)
==9366==    by 0x431299: runshfunc (exec.c:5040)
==9366==    by 0x430E76: doshfunc (exec.c:4920)
==9366==    by 0x4302FB: execshfunc (exec.c:4557)
==9366==    by 0x42D8C1: execcmd (exec.c:3373)
==9366== 
==9366== 
==9366== 2 errors in context 2 of 2:
==9366== Conditional jump or move depends on uninitialised value(s)
==9366==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9366==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9366==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9366==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9366==    by 0x42D8E9: execcmd (exec.c:3378)
==9366==    by 0x428CA0: execpline2 (exec.c:1697)
==9366==    by 0x427FD2: execpline (exec.c:1484)
==9366==    by 0x42779A: execlist (exec.c:1275)
==9366==    by 0x42717C: execode (exec.c:1073)
==9366==    by 0x431299: runshfunc (exec.c:5040)
==9366==    by 0x430E76: doshfunc (exec.c:4920)
==9366==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9366== 
==9366== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9365-- Caught __NR_exit; running __libc_freeres()
--9365-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9365== 
==9365== HEAP SUMMARY:
==9365==     in use at exit: 3,153,390 bytes in 68,966 blocks
==9365==   total heap usage: 928,555 allocs, 859,589 frees, 65,678,843 bytes allocated
==9365== 
==9365== Searching for pointers to 68,966 not-freed blocks
--9365--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9365--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9365--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9365--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9365--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9365--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9365--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9365--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9365--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9365--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9365--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9365--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9365--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9365--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9365--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9365--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9365--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9365--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9365--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9365--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9365--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9365--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9365--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9365--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9365--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9365--   Scanning root segment: 0x701a000..0x701afff (4096)
--9365--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9365--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9365--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9365--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9365--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9365--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9365--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9365--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9365--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9365== Checked 4,908,096 bytes
==9365== 
==9365== LEAK SUMMARY:
==9365==    definitely lost: 1,533 bytes in 8 blocks
==9365==    indirectly lost: 6,756 bytes in 7 blocks
==9365==      possibly lost: 0 bytes in 0 blocks
==9365==    still reachable: 3,145,101 bytes in 68,951 blocks
==9365==         suppressed: 0 bytes in 0 blocks
==9365== Rerun with --leak-check=full to see details of leaked memory
==9365== 
==9365== Use --track-origins=yes to see where uninitialised values come from
==9365== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9365== 
==9365== 1 errors in context 1 of 2:
==9365== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9365==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9365==    by 0x488CD0: stringsubst (subst.c:301)
==9365==    by 0x48801B: prefork (subst.c:77)
==9365==    by 0x42B318: execcmd (exec.c:2619)
==9365==    by 0x428CA0: execpline2 (exec.c:1697)
==9365==    by 0x427FD2: execpline (exec.c:1484)
==9365==    by 0x427756: execlist (exec.c:1267)
==9365==    by 0x42717C: execode (exec.c:1073)
==9365==    by 0x431299: runshfunc (exec.c:5040)
==9365==    by 0x430E76: doshfunc (exec.c:4920)
==9365==    by 0x4302FB: execshfunc (exec.c:4557)
==9365==    by 0x42D8C1: execcmd (exec.c:3373)
==9365== 
==9365== 
==9365== 2 errors in context 2 of 2:
==9365== Conditional jump or move depends on uninitialised value(s)
==9365==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9365==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9365==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9365==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9365==    by 0x42D8E9: execcmd (exec.c:3378)
==9365==    by 0x428CA0: execpline2 (exec.c:1697)
==9365==    by 0x427FD2: execpline (exec.c:1484)
==9365==    by 0x42779A: execlist (exec.c:1275)
==9365==    by 0x42717C: execode (exec.c:1073)
==9365==    by 0x431299: runshfunc (exec.c:5040)
==9365==    by 0x430E76: doshfunc (exec.c:4920)
==9365==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9365== 
==9365== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9369== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9369-by-pythonnut-on-???
==9369== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9369-by-pythonnut-on-???
==9369== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9369-by-pythonnut-on-???
==9369== 
==9369== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9369== don't want to do, unless you know exactly what you're doing,
==9369== or are doing some strange experiment):
==9369==   /usr/lib/valgrind/../../bin/vgdb --pid=9369 ...command...
==9369== 
==9369== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9369==   /path/to/gdb ./zsh
==9369== and then give GDB the following command
==9369==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9369
==9369== --pid is optional if only one valgrind process is running
==9369== 
--9369-- Caught __NR_exit; running __libc_freeres()
==9368== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9368-by-pythonnut-on-???
==9368== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9368-by-pythonnut-on-???
==9368== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9368-by-pythonnut-on-???
==9368== 
==9368== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9368== don't want to do, unless you know exactly what you're doing,
==9368== or are doing some strange experiment):
==9368==   /usr/lib/valgrind/../../bin/vgdb --pid=9368 ...command...
==9368== 
==9368== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9368==   /path/to/gdb ./zsh
==9368== and then give GDB the following command
==9368==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9368
==9368== --pid is optional if only one valgrind process is running
==9368== 
--9369-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9369== 
==9369== HEAP SUMMARY:
==9369==     in use at exit: 3,154,075 bytes in 68,972 blocks
==9369==   total heap usage: 928,564 allocs, 859,592 frees, 65,646,288 bytes allocated
==9369== 
==9369== Searching for pointers to 68,972 not-freed blocks
--9369--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9369--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9369--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9369--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9369--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9369--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9369--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9369--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9369--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9369--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9369--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9369--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9369--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9369--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9369--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9369--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9369--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9369--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9369--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9369--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9369--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9369--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9369--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9369--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9369--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9369--   Scanning root segment: 0x701a000..0x701afff (4096)
--9369--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9369--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9369--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9369--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9369--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9369--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9369--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9369--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9369--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9369== Checked 4,888,648 bytes
==9369== 
==9369== LEAK SUMMARY:
==9369==    definitely lost: 1,533 bytes in 8 blocks
==9369==    indirectly lost: 6,756 bytes in 7 blocks
==9369==      possibly lost: 0 bytes in 0 blocks
==9369==    still reachable: 3,145,786 bytes in 68,957 blocks
==9369==         suppressed: 0 bytes in 0 blocks
==9369== Rerun with --leak-check=full to see details of leaked memory
==9369== 
==9369== Use --track-origins=yes to see where uninitialised values come from
==9369== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9369== 
==9369== 1 errors in context 1 of 2:
==9369== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9369==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9369==    by 0x488CD0: stringsubst (subst.c:301)
==9369==    by 0x48801B: prefork (subst.c:77)
==9369==    by 0x42B318: execcmd (exec.c:2619)
==9369==    by 0x428CA0: execpline2 (exec.c:1697)
==9369==    by 0x427FD2: execpline (exec.c:1484)
==9369==    by 0x427756: execlist (exec.c:1267)
==9369==    by 0x42717C: execode (exec.c:1073)
==9369==    by 0x431299: runshfunc (exec.c:5040)
==9369==    by 0x430E76: doshfunc (exec.c:4920)
==9369==    by 0x4302FB: execshfunc (exec.c:4557)
==9369==    by 0x42D8C1: execcmd (exec.c:3373)
==9369== 
==9369== 
==9369== 2 errors in context 2 of 2:
==9369== Conditional jump or move depends on uninitialised value(s)
==9369==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9369==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9369==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9369==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9369==    by 0x42D8E9: execcmd (exec.c:3378)
==9369==    by 0x428CA0: execpline2 (exec.c:1697)
==9369==    by 0x427FD2: execpline (exec.c:1484)
==9369==    by 0x42779A: execlist (exec.c:1275)
==9369==    by 0x42717C: execode (exec.c:1073)
==9369==    by 0x431299: runshfunc (exec.c:5040)
==9369==    by 0x430E76: doshfunc (exec.c:4920)
==9369==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9369== 
==9369== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9368-- Caught __NR_exit; running __libc_freeres()
--9368-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9368== 
==9368== HEAP SUMMARY:
==9368==     in use at exit: 3,153,968 bytes in 68,972 blocks
==9368==   total heap usage: 928,601 allocs, 859,629 frees, 65,655,829 bytes allocated
==9368== 
==9368== Searching for pointers to 68,972 not-freed blocks
--9368--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9368--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9368--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9368--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9368--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9368--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9368--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9368--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9368--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9368--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9368--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9368--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9368--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9368--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9368--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9368--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9368--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9368--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9368--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9368--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9368--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9368--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9368--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9368--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9368--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9368--   Scanning root segment: 0x701a000..0x701afff (4096)
--9368--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9368--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9368--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9368--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9368--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9368--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9368--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9368--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9368--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9368== Checked 4,887,960 bytes
==9368== 
==9368== LEAK SUMMARY:
==9368==    definitely lost: 1,533 bytes in 8 blocks
==9368==    indirectly lost: 6,756 bytes in 7 blocks
==9368==      possibly lost: 0 bytes in 0 blocks
==9368==    still reachable: 3,145,679 bytes in 68,957 blocks
==9368==         suppressed: 0 bytes in 0 blocks
==9368== Rerun with --leak-check=full to see details of leaked memory
==9368== 
==9368== Use --track-origins=yes to see where uninitialised values come from
==9368== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9368== 
==9368== 1 errors in context 1 of 2:
==9368== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9368==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9368==    by 0x488CD0: stringsubst (subst.c:301)
==9368==    by 0x48801B: prefork (subst.c:77)
==9368==    by 0x42B318: execcmd (exec.c:2619)
==9368==    by 0x428CA0: execpline2 (exec.c:1697)
==9368==    by 0x427FD2: execpline (exec.c:1484)
==9368==    by 0x427756: execlist (exec.c:1267)
==9368==    by 0x42717C: execode (exec.c:1073)
==9368==    by 0x431299: runshfunc (exec.c:5040)
==9368==    by 0x430E76: doshfunc (exec.c:4920)
==9368==    by 0x4302FB: execshfunc (exec.c:4557)
==9368==    by 0x42D8C1: execcmd (exec.c:3373)
==9368== 
==9368== 
==9368== 2 errors in context 2 of 2:
==9368== Conditional jump or move depends on uninitialised value(s)
==9368==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9368==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9368==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9368==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9368==    by 0x42D8E9: execcmd (exec.c:3378)
==9368==    by 0x428CA0: execpline2 (exec.c:1697)
==9368==    by 0x427FD2: execpline (exec.c:1484)
==9368==    by 0x42779A: execlist (exec.c:1275)
==9368==    by 0x42717C: execode (exec.c:1073)
==9368==    by 0x431299: runshfunc (exec.c:5040)
==9368==    by 0x430E76: doshfunc (exec.c:4920)
==9368==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9368== 
==9368== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9370== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9370-by-pythonnut-on-???
==9370== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9370-by-pythonnut-on-???
==9370== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9370-by-pythonnut-on-???
==9370== 
==9370== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9370== don't want to do, unless you know exactly what you're doing,
==9370== or are doing some strange experiment):
==9370==   /usr/lib/valgrind/../../bin/vgdb --pid=9370 ...command...
==9370== 
==9370== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9370==   /path/to/gdb ./zsh
==9370== and then give GDB the following command
==9370==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9370
==9370== --pid is optional if only one valgrind process is running
==9370== 
--9370-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1A3C,  len 4
--9370-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9371-- Caught __NR_exit; running __libc_freeres()
==9370== 
==9370== HEAP SUMMARY:
==9370==     in use at exit: 3,117,760 bytes in 68,972 blocks
==9370==   total heap usage: 928,573 allocs, 859,601 frees, 65,650,504 bytes allocated
==9370== 
==9371== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9371-by-pythonnut-on-???
==9371== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9371-by-pythonnut-on-???
==9371== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9371-by-pythonnut-on-???
==9371== 
==9371== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9371== don't want to do, unless you know exactly what you're doing,
==9371== or are doing some strange experiment):
==9371==   /usr/lib/valgrind/../../bin/vgdb --pid=9371 ...command...
==9371== 
==9371== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9371==   /path/to/gdb ./zsh
==9371== and then give GDB the following command
==9371==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9371
==9371== --pid is optional if only one valgrind process is running
==9371== 
--9371-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9370== Searching for pointers to 68,972 not-freed blocks
--9370--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9370--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9370--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9370--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9370--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9370--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9370--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9370--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9370--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9370--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9370--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9370--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9370--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9370--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9370--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9370--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9370--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9370--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9370--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9370--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9370--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9370--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9370--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9370--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9370--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9370--   Scanning root segment: 0x701a000..0x701afff (4096)
--9370--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9370--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9370--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9370--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9370--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9370--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9370--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9370--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9370--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9371== 
==9371== HEAP SUMMARY:
==9371==     in use at exit: 3,117,504 bytes in 68,972 blocks
==9371==   total heap usage: 928,579 allocs, 859,607 frees, 65,652,624 bytes allocated
==9371== 
==9371== Searching for pointers to 68,972 not-freed blocks
--9371--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9371--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9371--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9371--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9371--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9371--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9371--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9371--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9371--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9371--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9371--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9371--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9371--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9371--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9371--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9371--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9371--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9371--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9371--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9371--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9371--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9371--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9371--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9371--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9371--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9371--   Scanning root segment: 0x701a000..0x701afff (4096)
--9371--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9371--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9371--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9371--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9371--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9371--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9371--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9371--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9371--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9370== Checked 4,851,320 bytes
==9370== 
==9370== LEAK SUMMARY:
==9370==    definitely lost: 1,533 bytes in 8 blocks
==9370==    indirectly lost: 6,756 bytes in 7 blocks
==9370==      possibly lost: 0 bytes in 0 blocks
==9370==    still reachable: 3,109,471 bytes in 68,957 blocks
==9370==         suppressed: 0 bytes in 0 blocks
==9370== Rerun with --leak-check=full to see details of leaked memory
==9370== 
==9370== Use --track-origins=yes to see where uninitialised values come from
==9370== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9370== 
==9370== 1 errors in context 1 of 2:
==9370== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9370==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9370==    by 0x488CD0: stringsubst (subst.c:301)
==9370==    by 0x48801B: prefork (subst.c:77)
==9370==    by 0x42B318: execcmd (exec.c:2619)
==9370==    by 0x428CA0: execpline2 (exec.c:1697)
==9370==    by 0x427FD2: execpline (exec.c:1484)
==9370==    by 0x427756: execlist (exec.c:1267)
==9370==    by 0x42717C: execode (exec.c:1073)
==9370==    by 0x431299: runshfunc (exec.c:5040)
==9370==    by 0x430E76: doshfunc (exec.c:4920)
==9370==    by 0x4302FB: execshfunc (exec.c:4557)
==9370==    by 0x42D8C1: execcmd (exec.c:3373)
==9370== 
==9370== 
==9370== 2 errors in context 2 of 2:
==9370== Conditional jump or move depends on uninitialised value(s)
==9370==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9370==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9370==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9370==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9370==    by 0x42D8E9: execcmd (exec.c:3378)
==9370==    by 0x428CA0: execpline2 (exec.c:1697)
==9370==    by 0x427FD2: execpline (exec.c:1484)
==9370==    by 0x42779A: execlist (exec.c:1275)
==9370==    by 0x42717C: execode (exec.c:1073)
==9370==    by 0x431299: runshfunc (exec.c:5040)
==9370==    by 0x430E76: doshfunc (exec.c:4920)
==9370==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9370== 
==9370== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9371== Checked 4,851,168 bytes
==9371== 
==9371== LEAK SUMMARY:
==9371==    definitely lost: 1,557 bytes in 9 blocks
==9371==    indirectly lost: 6,796 bytes in 9 blocks
==9371==      possibly lost: 0 bytes in 0 blocks
==9371==    still reachable: 3,109,151 bytes in 68,954 blocks
==9371==         suppressed: 0 bytes in 0 blocks
==9371== Rerun with --leak-check=full to see details of leaked memory
==9371== 
==9371== Use --track-origins=yes to see where uninitialised values come from
==9371== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9371== 
==9371== 1 errors in context 1 of 2:
==9371== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9371==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9371==    by 0x488CD0: stringsubst (subst.c:301)
==9371==    by 0x48801B: prefork (subst.c:77)
==9371==    by 0x42B318: execcmd (exec.c:2619)
==9371==    by 0x428CA0: execpline2 (exec.c:1697)
==9371==    by 0x427FD2: execpline (exec.c:1484)
==9371==    by 0x427756: execlist (exec.c:1267)
==9371==    by 0x42717C: execode (exec.c:1073)
==9371==    by 0x431299: runshfunc (exec.c:5040)
==9371==    by 0x430E76: doshfunc (exec.c:4920)
==9371==    by 0x4302FB: execshfunc (exec.c:4557)
==9371==    by 0x42D8C1: execcmd (exec.c:3373)
==9371== 
==9371== 
==9371== 2 errors in context 2 of 2:
==9371== Conditional jump or move depends on uninitialised value(s)
==9371==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9371==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9371==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9371==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9371==    by 0x42D8E9: execcmd (exec.c:3378)
==9371==    by 0x428CA0: execpline2 (exec.c:1697)
==9371==    by 0x427FD2: execpline (exec.c:1484)
==9371==    by 0x42779A: execlist (exec.c:1275)
==9371==    by 0x42717C: execode (exec.c:1073)
==9371==    by 0x431299: runshfunc (exec.c:5040)
==9371==    by 0x430E76: doshfunc (exec.c:4920)
==9371==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9371== 
==9371== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9373== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9373-by-pythonnut-on-???
==9373== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9373-by-pythonnut-on-???
==9373== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9373-by-pythonnut-on-???
==9373== 
==9373== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9373== don't want to do, unless you know exactly what you're doing,
==9373== or are doing some strange experiment):
==9373==   /usr/lib/valgrind/../../bin/vgdb --pid=9373 ...command...
==9373== 
==9373== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9373==   /path/to/gdb ./zsh
==9373== and then give GDB the following command
==9373==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9373
==9373== --pid is optional if only one valgrind process is running
==9373== 
client request: code 4d430005,  addr 0xFFEFF23BC,  len 4
--9357-- Caught __NR_exit; running __libc_freeres()
--9357-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9357== 
==9357== HEAP SUMMARY:
==9357==     in use at exit: 3,116,086 bytes in 68,949 blocks
==9357==   total heap usage: 928,580 allocs, 859,631 frees, 65,653,192 bytes allocated
==9357== 
==9357== Searching for pointers to 68,949 not-freed blocks
--9357--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9357--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9357--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9357--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9357--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9357--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9357--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9357--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9357--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9357--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9357--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9357--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9357--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9357--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9357--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9357--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9357--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9357--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9357--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9357--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9357--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9357--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9357--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9357--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9357--   Scanning root segment: 0x701a000..0x701afff (4096)
--9357--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9357--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9357--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9357--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9357--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9357--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9357--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9357--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9357--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9357== Checked 4,757,568 bytes
==9357== 
==9357== LEAK SUMMARY:
==9357==    definitely lost: 1,533 bytes in 8 blocks
==9357==    indirectly lost: 6,756 bytes in 7 blocks
==9357==      possibly lost: 0 bytes in 0 blocks
==9357==    still reachable: 3,107,797 bytes in 68,934 blocks
==9357==         suppressed: 0 bytes in 0 blocks
==9357== Rerun with --leak-check=full to see details of leaked memory
==9357== 
==9357== Use --track-origins=yes to see where uninitialised values come from
==9357== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9357== 
==9357== 1 errors in context 1 of 2:
==9357== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9357==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9357==    by 0x488CD0: stringsubst (subst.c:301)
==9357==    by 0x48801B: prefork (subst.c:77)
==9357==    by 0x42B318: execcmd (exec.c:2619)
==9357==    by 0x428CA0: execpline2 (exec.c:1697)
==9357==    by 0x427FD2: execpline (exec.c:1484)
==9357==    by 0x427756: execlist (exec.c:1267)
==9357==    by 0x42717C: execode (exec.c:1073)
==9357==    by 0x431299: runshfunc (exec.c:5040)
==9357==    by 0x430E76: doshfunc (exec.c:4920)
==9357==    by 0x4302FB: execshfunc (exec.c:4557)
==9357==    by 0x42D8C1: execcmd (exec.c:3373)
==9357== 
==9357== 
==9357== 2 errors in context 2 of 2:
==9357== Conditional jump or move depends on uninitialised value(s)
==9357==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9357==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9357==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9357==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9357==    by 0x42D8E9: execcmd (exec.c:3378)
==9357==    by 0x428CA0: execpline2 (exec.c:1697)
==9357==    by 0x427FD2: execpline (exec.c:1484)
==9357==    by 0x42779A: execlist (exec.c:1275)
==9357==    by 0x42717C: execode (exec.c:1073)
==9357==    by 0x431299: runshfunc (exec.c:5040)
==9357==    by 0x430E76: doshfunc (exec.c:4920)
==9357==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9357== 
==9357== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9377== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9377-by-pythonnut-on-???
==9377== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9377-by-pythonnut-on-???
==9377== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9377-by-pythonnut-on-???
==9377== 
==9377== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9377== don't want to do, unless you know exactly what you're doing,
==9377== or are doing some strange experiment):
==9377==   /usr/lib/valgrind/../../bin/vgdb --pid=9377 ...command...
==9377== 
==9377== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9377==   /path/to/gdb ./zsh
==9377== and then give GDB the following command
==9377==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9377
==9377== --pid is optional if only one valgrind process is running
==9377== 
--9377-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF2CEC,  len 4
==9379== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9379-by-pythonnut-on-???
==9379== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9379-by-pythonnut-on-???
==9379== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9379-by-pythonnut-on-???
==9379== 
==9379== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9379== don't want to do, unless you know exactly what you're doing,
==9379== or are doing some strange experiment):
==9379==   /usr/lib/valgrind/../../bin/vgdb --pid=9379 ...command...
==9379== 
==9379== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9379==   /path/to/gdb ./zsh
==9379== and then give GDB the following command
==9379==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9379
==9379== --pid is optional if only one valgrind process is running
==9379== 
client request: code 4d430005,  addr 0xFFEFF2C4C,  len 4
--9377-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9377== 
==9377== HEAP SUMMARY:
==9377==     in use at exit: 3,116,414 bytes in 68,950 blocks
==9377==   total heap usage: 928,525 allocs, 859,575 frees, 65,602,478 bytes allocated
==9377== 
==9377== Searching for pointers to 68,950 not-freed blocks
--9377--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9377--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9377--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9377--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9377--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9377--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9377--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9377--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9377--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9377--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9377--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9377--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9377--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9377--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9377--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9377--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9377--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9377--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9377--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9377--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9377--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9377--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9377--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9377--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9377--   Scanning root segment: 0x701a000..0x701afff (4096)
--9377--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9377--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9377--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9377--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9377--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9377--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9377--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9377--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9377--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9377== Checked 4,759,104 bytes
==9377== 
==9377== LEAK SUMMARY:
==9377==    definitely lost: 1,533 bytes in 8 blocks
==9377==    indirectly lost: 6,756 bytes in 7 blocks
==9377==      possibly lost: 0 bytes in 0 blocks
==9377==    still reachable: 3,108,125 bytes in 68,935 blocks
==9377==         suppressed: 0 bytes in 0 blocks
==9377== Rerun with --leak-check=full to see details of leaked memory
==9377== 
==9377== Use --track-origins=yes to see where uninitialised values come from
==9377== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9377== 
==9377== 1 errors in context 1 of 2:
==9377== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9377==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9377==    by 0x488CD0: stringsubst (subst.c:301)
==9377==    by 0x48801B: prefork (subst.c:77)
==9377==    by 0x42B318: execcmd (exec.c:2619)
==9377==    by 0x428CA0: execpline2 (exec.c:1697)
==9377==    by 0x427FD2: execpline (exec.c:1484)
==9377==    by 0x427756: execlist (exec.c:1267)
==9377==    by 0x42717C: execode (exec.c:1073)
==9377==    by 0x431299: runshfunc (exec.c:5040)
==9377==    by 0x430E76: doshfunc (exec.c:4920)
==9377==    by 0x4302FB: execshfunc (exec.c:4557)
==9377==    by 0x42D8C1: execcmd (exec.c:3373)
==9377== 
==9377== 
==9377== 2 errors in context 2 of 2:
==9377== Conditional jump or move depends on uninitialised value(s)
==9377==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9377==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9377==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9377==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9377==    by 0x42D8E9: execcmd (exec.c:3378)
==9377==    by 0x428CA0: execpline2 (exec.c:1697)
==9377==    by 0x427FD2: execpline (exec.c:1484)
==9377==    by 0x42779A: execlist (exec.c:1275)
==9377==    by 0x42717C: execode (exec.c:1073)
==9377==    by 0x431299: runshfunc (exec.c:5040)
==9377==    by 0x430E76: doshfunc (exec.c:4920)
==9377==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9377== 
==9377== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9376-- Caught __NR_exit; running __libc_freeres()
==9376== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9376-by-pythonnut-on-???
==9376== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9376-by-pythonnut-on-???
==9376== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9376-by-pythonnut-on-???
==9376== 
==9376== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9376== don't want to do, unless you know exactly what you're doing,
==9376== or are doing some strange experiment):
==9376==   /usr/lib/valgrind/../../bin/vgdb --pid=9376 ...command...
==9376== 
==9376== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9376==   /path/to/gdb ./zsh
==9376== and then give GDB the following command
==9376==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9376
==9376== --pid is optional if only one valgrind process is running
==9376== 
--9376-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9376== 
==9376== HEAP SUMMARY:
==9376==     in use at exit: 3,116,126 bytes in 68,947 blocks
==9376==   total heap usage: 928,531 allocs, 859,584 frees, 65,603,366 bytes allocated
==9376== 
==9376== Searching for pointers to 68,947 not-freed blocks
--9376--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9376--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9376--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9376--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9376--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9376--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9376--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9376--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9376--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9376--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9376--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9376--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9376--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9376--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9376--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9376--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9376--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9376--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9376--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9376--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9376--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9376--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9376--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9376--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9376--   Scanning root segment: 0x701a000..0x701afff (4096)
--9376--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9376--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9376--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9376--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9376--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9376--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9376--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9376--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9376--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9376== Checked 4,758,184 bytes
==9376== 
==9376== LEAK SUMMARY:
==9376==    definitely lost: 1,533 bytes in 8 blocks
==9376==    indirectly lost: 6,756 bytes in 7 blocks
==9376==      possibly lost: 0 bytes in 0 blocks
==9376==    still reachable: 3,107,837 bytes in 68,932 blocks
==9376==         suppressed: 0 bytes in 0 blocks
==9376== Rerun with --leak-check=full to see details of leaked memory
==9376== 
==9376== Use --track-origins=yes to see where uninitialised values come from
==9376== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9376== 
==9376== 1 errors in context 1 of 2:
==9376== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9376==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9376==    by 0x488CD0: stringsubst (subst.c:301)
==9376==    by 0x48801B: prefork (subst.c:77)
==9376==    by 0x42B318: execcmd (exec.c:2619)
==9376==    by 0x428CA0: execpline2 (exec.c:1697)
==9376==    by 0x427FD2: execpline (exec.c:1484)
==9376==    by 0x427756: execlist (exec.c:1267)
==9376==    by 0x42717C: execode (exec.c:1073)
==9376==    by 0x431299: runshfunc (exec.c:5040)
==9376==    by 0x430E76: doshfunc (exec.c:4920)
==9376==    by 0x4302FB: execshfunc (exec.c:4557)
==9376==    by 0x42D8C1: execcmd (exec.c:3373)
==9376== 
==9376== 
==9376== 2 errors in context 2 of 2:
==9376== Conditional jump or move depends on uninitialised value(s)
==9376==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9376==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9376==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9376==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9376==    by 0x42D8E9: execcmd (exec.c:3378)
==9376==    by 0x428CA0: execpline2 (exec.c:1697)
==9376==    by 0x427FD2: execpline (exec.c:1484)
==9376==    by 0x42779A: execlist (exec.c:1275)
==9376==    by 0x42717C: execode (exec.c:1073)
==9376==    by 0x431299: runshfunc (exec.c:5040)
==9376==    by 0x430E76: doshfunc (exec.c:4920)
==9376==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9376== 
==9376== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9380== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9380-by-pythonnut-on-???
==9380== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9380-by-pythonnut-on-???
==9380== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9380-by-pythonnut-on-???
==9380== 
==9380== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9380== don't want to do, unless you know exactly what you're doing,
==9380== or are doing some strange experiment):
==9380==   /usr/lib/valgrind/../../bin/vgdb --pid=9380 ...command...
==9380== 
==9380== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9380==   /path/to/gdb ./zsh
==9380== and then give GDB the following command
==9380==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9380
==9380== --pid is optional if only one valgrind process is running
==9380== 
==9381== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9381-by-pythonnut-on-???
==9381== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9381-by-pythonnut-on-???
==9381== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9381-by-pythonnut-on-???
==9381== 
==9381== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9381== don't want to do, unless you know exactly what you're doing,
==9381== or are doing some strange experiment):
==9381==   /usr/lib/valgrind/../../bin/vgdb --pid=9381 ...command...
==9381== 
==9381== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9381==   /path/to/gdb ./zsh
==9381== and then give GDB the following command
==9381==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9381
==9381== --pid is optional if only one valgrind process is running
==9381== 
--9381-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF188C,  len 4
client request: code 4d430005,  addr 0xFFEFF17EC,  len 4
--9381-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9381== 
==9381== HEAP SUMMARY:
==9381==     in use at exit: 3,116,336 bytes in 68,952 blocks
==9381==   total heap usage: 928,558 allocs, 859,606 frees, 65,615,667 bytes allocated
==9381== 
==9381== Searching for pointers to 68,952 not-freed blocks
--9381--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9381--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9381--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9381--   Scanning root segment: 0x4037000..0x403afff (16384)
--9381--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9381--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9381--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9381--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9381--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9381--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9381--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9381--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9381--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9381--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9381--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9381--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9381--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9381--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9381--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9381--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9381--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9381--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9381--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9381--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9381--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9381--   Scanning root segment: 0x701a000..0x701afff (4096)
--9381--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9381--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9381--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9381--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9381--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9381--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9381--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9381--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9381--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9381== Checked 4,776,712 bytes
==9381== 
==9381== LEAK SUMMARY:
==9381==    definitely lost: 1,533 bytes in 8 blocks
==9381==    indirectly lost: 6,756 bytes in 7 blocks
==9381==      possibly lost: 0 bytes in 0 blocks
==9381==    still reachable: 3,108,047 bytes in 68,937 blocks
==9381==         suppressed: 0 bytes in 0 blocks
==9381== Rerun with --leak-check=full to see details of leaked memory
==9381== 
==9381== Use --track-origins=yes to see where uninitialised values come from
==9381== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9381== 
==9381== 1 errors in context 1 of 2:
==9381== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9381==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9381==    by 0x488CD0: stringsubst (subst.c:301)
==9381==    by 0x48801B: prefork (subst.c:77)
==9381==    by 0x42B318: execcmd (exec.c:2619)
==9381==    by 0x428CA0: execpline2 (exec.c:1697)
==9381==    by 0x427FD2: execpline (exec.c:1484)
==9381==    by 0x427756: execlist (exec.c:1267)
==9381==    by 0x42717C: execode (exec.c:1073)
==9381==    by 0x431299: runshfunc (exec.c:5040)
==9381==    by 0x430E76: doshfunc (exec.c:4920)
==9381==    by 0x4302FB: execshfunc (exec.c:4557)
==9381==    by 0x42D8C1: execcmd (exec.c:3373)
==9381== 
==9381== 
==9381== 2 errors in context 2 of 2:
==9381== Conditional jump or move depends on uninitialised value(s)
==9381==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9381==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9381==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9381==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9381==    by 0x42D8E9: execcmd (exec.c:3378)
==9381==    by 0x428CA0: execpline2 (exec.c:1697)
==9381==    by 0x427FD2: execpline (exec.c:1484)
==9381==    by 0x42779A: execlist (exec.c:1275)
==9381==    by 0x42717C: execode (exec.c:1073)
==9381==    by 0x431299: runshfunc (exec.c:5040)
==9381==    by 0x430E76: doshfunc (exec.c:4920)
==9381==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9381== 
==9381== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9380-- Caught __NR_exit; running __libc_freeres()
--9380-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9380== 
==9380== HEAP SUMMARY:
==9380==     in use at exit: 3,116,373 bytes in 68,953 blocks
==9380==   total heap usage: 928,554 allocs, 859,601 frees, 65,612,083 bytes allocated
==9380== 
==9380== Searching for pointers to 68,953 not-freed blocks
--9380--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9380--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9380--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9380--   Scanning root segment: 0x4037000..0x403afff (16384)
--9380--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9380--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9380--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9380--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9380--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9380--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9380--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9380--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9380--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9380--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9380--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9380--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9380--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9380--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9380--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9380--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9380--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9380--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9380--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9380--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9380--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9380--   Scanning root segment: 0x701a000..0x701afff (4096)
--9380--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9380--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9380--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9380--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9380--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9380--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9380--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9380--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9380--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9380== Checked 4,776,416 bytes
==9380== 
==9380== LEAK SUMMARY:
==9380==    definitely lost: 1,533 bytes in 8 blocks
==9380==    indirectly lost: 6,756 bytes in 7 blocks
==9380==      possibly lost: 0 bytes in 0 blocks
==9380==    still reachable: 3,108,084 bytes in 68,938 blocks
==9380==         suppressed: 0 bytes in 0 blocks
==9380== Rerun with --leak-check=full to see details of leaked memory
==9380== 
==9380== Use --track-origins=yes to see where uninitialised values come from
==9380== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9380== 
==9380== 1 errors in context 1 of 2:
==9380== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9380==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9380==    by 0x488CD0: stringsubst (subst.c:301)
==9380==    by 0x48801B: prefork (subst.c:77)
==9380==    by 0x42B318: execcmd (exec.c:2619)
==9380==    by 0x428CA0: execpline2 (exec.c:1697)
==9380==    by 0x427FD2: execpline (exec.c:1484)
==9380==    by 0x427756: execlist (exec.c:1267)
==9380==    by 0x42717C: execode (exec.c:1073)
==9380==    by 0x431299: runshfunc (exec.c:5040)
==9380==    by 0x430E76: doshfunc (exec.c:4920)
==9380==    by 0x4302FB: execshfunc (exec.c:4557)
==9380==    by 0x42D8C1: execcmd (exec.c:3373)
==9380== 
==9380== 
==9380== 2 errors in context 2 of 2:
==9380== Conditional jump or move depends on uninitialised value(s)
==9380==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9380==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9380==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9380==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9380==    by 0x42D8E9: execcmd (exec.c:3378)
==9380==    by 0x428CA0: execpline2 (exec.c:1697)
==9380==    by 0x427FD2: execpline (exec.c:1484)
==9380==    by 0x42779A: execlist (exec.c:1275)
==9380==    by 0x42717C: execode (exec.c:1073)
==9380==    by 0x431299: runshfunc (exec.c:5040)
==9380==    by 0x430E76: doshfunc (exec.c:4920)
==9380==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9380== 
==9380== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1DDC,  len 4
--9384-- Caught __NR_exit; running __libc_freeres()
==9384== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9384-by-pythonnut-on-???
==9384== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9384-by-pythonnut-on-???
==9384== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9384-by-pythonnut-on-???
==9384== 
==9384== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9384== don't want to do, unless you know exactly what you're doing,
==9384== or are doing some strange experiment):
==9384==   /usr/lib/valgrind/../../bin/vgdb --pid=9384 ...command...
==9384== 
==9384== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9384==   /path/to/gdb ./zsh
==9384== and then give GDB the following command
==9384==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9384
==9384== --pid is optional if only one valgrind process is running
==9384== 
--9384-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9384== 
==9384== HEAP SUMMARY:
==9384==     in use at exit: 3,116,717 bytes in 68,958 blocks
==9384==   total heap usage: 928,566 allocs, 859,608 frees, 65,617,409 bytes allocated
==9384== 
==9384== Searching for pointers to 68,958 not-freed blocks
--9384--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9384--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9384--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9384--   Scanning root segment: 0x4037000..0x403afff (16384)
--9384--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9384--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9384--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9384--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9384--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9384--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9384--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9384--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9384--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9384--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9384--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9384--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9384--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9384--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9384--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9384--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9384--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9384--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9384--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9384--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9384--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9384--   Scanning root segment: 0x701a000..0x701afff (4096)
--9384--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9384--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9384--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9384--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9384--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9384--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9384--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9384--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9384--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9384== Checked 4,776,480 bytes
==9384== 
==9384== LEAK SUMMARY:
==9384==    definitely lost: 1,533 bytes in 8 blocks
==9384==    indirectly lost: 6,756 bytes in 7 blocks
==9384==      possibly lost: 0 bytes in 0 blocks
==9384==    still reachable: 3,108,428 bytes in 68,943 blocks
==9384==         suppressed: 0 bytes in 0 blocks
==9384== Rerun with --leak-check=full to see details of leaked memory
==9384== 
==9384== Use --track-origins=yes to see where uninitialised values come from
==9384== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9384== 
==9384== 1 errors in context 1 of 2:
==9384== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9384==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9384==    by 0x488CD0: stringsubst (subst.c:301)
==9384==    by 0x48801B: prefork (subst.c:77)
==9384==    by 0x42B318: execcmd (exec.c:2619)
==9384==    by 0x428CA0: execpline2 (exec.c:1697)
==9384==    by 0x427FD2: execpline (exec.c:1484)
==9384==    by 0x427756: execlist (exec.c:1267)
==9384==    by 0x42717C: execode (exec.c:1073)
==9384==    by 0x431299: runshfunc (exec.c:5040)
==9384==    by 0x430E76: doshfunc (exec.c:4920)
==9384==    by 0x4302FB: execshfunc (exec.c:4557)
==9384==    by 0x42D8C1: execcmd (exec.c:3373)
==9384== 
==9384== 
==9384== 2 errors in context 2 of 2:
==9384== Conditional jump or move depends on uninitialised value(s)
==9384==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9384==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9384==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9384==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9384==    by 0x42D8E9: execcmd (exec.c:3378)
==9384==    by 0x428CA0: execpline2 (exec.c:1697)
==9384==    by 0x427FD2: execpline (exec.c:1484)
==9384==    by 0x42779A: execlist (exec.c:1275)
==9384==    by 0x42717C: execode (exec.c:1073)
==9384==    by 0x431299: runshfunc (exec.c:5040)
==9384==    by 0x430E76: doshfunc (exec.c:4920)
==9384==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9384== 
==9384== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF192C,  len 4
--9388-- Caught __NR_exit; running __libc_freeres()
==9388== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9388-by-pythonnut-on-???
==9388== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9388-by-pythonnut-on-???
==9388== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9388-by-pythonnut-on-???
==9388== 
==9388== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9388== don't want to do, unless you know exactly what you're doing,
==9388== or are doing some strange experiment):
==9388==   /usr/lib/valgrind/../../bin/vgdb --pid=9388 ...command...
==9388== 
==9388== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9388==   /path/to/gdb ./zsh
==9388== and then give GDB the following command
==9388==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9388
==9388== --pid is optional if only one valgrind process is running
==9388== 
--9388-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9388== 
==9388== HEAP SUMMARY:
==9388==     in use at exit: 3,116,746 bytes in 68,959 blocks
==9388==   total heap usage: 928,571 allocs, 859,612 frees, 65,619,550 bytes allocated
==9388== 
==9388== Searching for pointers to 68,959 not-freed blocks
--9388--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9388--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9388--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9388--   Scanning root segment: 0x4037000..0x403afff (16384)
--9388--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9388--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9388--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9388--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9388--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9388--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9388--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9388--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9388--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9388--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9388--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9388--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9388--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9388--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9388--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9388--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9388--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9388--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9388--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9388--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9388--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9388--   Scanning root segment: 0x701a000..0x701afff (4096)
--9388--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9388--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9388--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9388--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9388--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9388--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9388--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9388--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9388--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9388== Checked 4,776,776 bytes
==9388== 
==9388== LEAK SUMMARY:
==9388==    definitely lost: 1,533 bytes in 8 blocks
==9388==    indirectly lost: 6,756 bytes in 7 blocks
==9388==      possibly lost: 0 bytes in 0 blocks
==9388==    still reachable: 3,108,457 bytes in 68,944 blocks
==9388==         suppressed: 0 bytes in 0 blocks
==9388== Rerun with --leak-check=full to see details of leaked memory
==9388== 
==9388== Use --track-origins=yes to see where uninitialised values come from
==9388== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9388== 
==9388== 1 errors in context 1 of 2:
==9388== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9388==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9388==    by 0x488CD0: stringsubst (subst.c:301)
==9388==    by 0x48801B: prefork (subst.c:77)
==9388==    by 0x42B318: execcmd (exec.c:2619)
==9388==    by 0x428CA0: execpline2 (exec.c:1697)
==9388==    by 0x427FD2: execpline (exec.c:1484)
==9388==    by 0x427756: execlist (exec.c:1267)
==9388==    by 0x42717C: execode (exec.c:1073)
==9388==    by 0x431299: runshfunc (exec.c:5040)
==9388==    by 0x430E76: doshfunc (exec.c:4920)
==9388==    by 0x4302FB: execshfunc (exec.c:4557)
==9388==    by 0x42D8C1: execcmd (exec.c:3373)
==9388== 
==9388== 
==9388== 2 errors in context 2 of 2:
==9388== Conditional jump or move depends on uninitialised value(s)
==9388==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9388==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9388==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9388==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9388==    by 0x42D8E9: execcmd (exec.c:3378)
==9388==    by 0x428CA0: execpline2 (exec.c:1697)
==9388==    by 0x427FD2: execpline (exec.c:1484)
==9388==    by 0x42779A: execlist (exec.c:1275)
==9388==    by 0x42717C: execode (exec.c:1073)
==9388==    by 0x431299: runshfunc (exec.c:5040)
==9388==    by 0x430E76: doshfunc (exec.c:4920)
==9388==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9388== 
==9388== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9390== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9390-by-pythonnut-on-???
==9390== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9390-by-pythonnut-on-???
==9390== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9390-by-pythonnut-on-???
==9390== 
==9390== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9390== don't want to do, unless you know exactly what you're doing,
==9390== or are doing some strange experiment):
==9390==   /usr/lib/valgrind/../../bin/vgdb --pid=9390 ...command...
==9390== 
==9390== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9390==   /path/to/gdb ./zsh
==9390== and then give GDB the following command
==9390==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9390
==9390== --pid is optional if only one valgrind process is running
==9390== 
client request: code 4d430005,  addr 0xFFEFF22AC,  len 4
client request: code 4d430005,  addr 0xFFEFF1C2C,  len 4
--9356-- Caught __NR_exit; running __libc_freeres()
--9356-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9356== 
==9356== HEAP SUMMARY:
==9356==     in use at exit: 3,114,746 bytes in 68,911 blocks
==9356==   total heap usage: 928,580 allocs, 859,669 frees, 65,623,490 bytes allocated
==9356== 
==9356== Searching for pointers to 68,911 not-freed blocks
--9356--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9356--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9356--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9356--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9356--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9356--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9356--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9356--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9356--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9356--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9356--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9356--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9356--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9356--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9356--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9356--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9356--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9356--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9356--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9356--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9356--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9356--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9356--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9356--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9356--   Scanning root segment: 0x701a000..0x701afff (4096)
--9356--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9356--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9356--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9356--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9356--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9356--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9356--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9356--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9356--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9356== Checked 4,754,480 bytes
==9356== 
==9356== LEAK SUMMARY:
==9356==    definitely lost: 1,533 bytes in 8 blocks
==9356==    indirectly lost: 6,756 bytes in 7 blocks
==9356==      possibly lost: 0 bytes in 0 blocks
==9356==    still reachable: 3,106,457 bytes in 68,896 blocks
==9356==         suppressed: 0 bytes in 0 blocks
==9356== Rerun with --leak-check=full to see details of leaked memory
==9356== 
==9356== Use --track-origins=yes to see where uninitialised values come from
==9356== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9356== 
==9356== 1 errors in context 1 of 2:
==9356== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9356==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9356==    by 0x488CD0: stringsubst (subst.c:301)
==9356==    by 0x48801B: prefork (subst.c:77)
==9356==    by 0x42B318: execcmd (exec.c:2619)
==9356==    by 0x428CA0: execpline2 (exec.c:1697)
==9356==    by 0x427FD2: execpline (exec.c:1484)
==9356==    by 0x427756: execlist (exec.c:1267)
==9356==    by 0x42717C: execode (exec.c:1073)
==9356==    by 0x431299: runshfunc (exec.c:5040)
==9356==    by 0x430E76: doshfunc (exec.c:4920)
==9356==    by 0x4302FB: execshfunc (exec.c:4557)
==9356==    by 0x42D8C1: execcmd (exec.c:3373)
==9356== 
==9356== 
==9356== 2 errors in context 2 of 2:
==9356== Conditional jump or move depends on uninitialised value(s)
==9356==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9356==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9356==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9356==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9356==    by 0x42D8E9: execcmd (exec.c:3378)
==9356==    by 0x428CA0: execpline2 (exec.c:1697)
==9356==    by 0x427FD2: execpline (exec.c:1484)
==9356==    by 0x42779A: execlist (exec.c:1275)
==9356==    by 0x42717C: execode (exec.c:1073)
==9356==    by 0x431299: runshfunc (exec.c:5040)
==9356==    by 0x430E76: doshfunc (exec.c:4920)
==9356==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9356== 
==9356== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
==9392== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9392-by-pythonnut-on-???
==9392== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9392-by-pythonnut-on-???
==9392== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9392-by-pythonnut-on-???
==9392== 
==9392== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9392== don't want to do, unless you know exactly what you're doing,
==9392== or are doing some strange experiment):
==9392==   /usr/lib/valgrind/../../bin/vgdb --pid=9392 ...command...
==9392== 
==9392== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9392==   /path/to/gdb ./zsh
==9392== and then give GDB the following command
==9392==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9392
==9392== --pid is optional if only one valgrind process is running
==9392== 
--9392-- Caught __NR_exit; running __libc_freeres()
--9392-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9392== 
==9392== HEAP SUMMARY:
==9392==     in use at exit: 3,116,928 bytes in 68,923 blocks
==9392==   total heap usage: 936,381 allocs, 867,458 frees, 66,946,264 bytes allocated
==9392== 
==9392== Searching for pointers to 68,923 not-freed blocks
--9392--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9392--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9392--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9392--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9392--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9392--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9392--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9392--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9392--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9392--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9392--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9392--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9392--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9392--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9392--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9392--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9392--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9392--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9392--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9392--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9392--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9392--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9392--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9392--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9392--   Scanning root segment: 0x701a000..0x701afff (4096)
--9392--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9392--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9392--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9392--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9392--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9392--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9392--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9392--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9392--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9392== Checked 4,779,960 bytes
==9392== 
==9392== LEAK SUMMARY:
==9392==    definitely lost: 1,533 bytes in 8 blocks
==9392==    indirectly lost: 6,756 bytes in 7 blocks
==9392==      possibly lost: 0 bytes in 0 blocks
==9392==    still reachable: 3,108,639 bytes in 68,908 blocks
==9392==         suppressed: 0 bytes in 0 blocks
==9392== Rerun with --leak-check=full to see details of leaked memory
==9392== 
==9392== Use --track-origins=yes to see where uninitialised values come from
==9392== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9392== 
==9392== 1 errors in context 1 of 2:
==9392== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9392==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9392==    by 0x488CD0: stringsubst (subst.c:301)
==9392==    by 0x48801B: prefork (subst.c:77)
==9392==    by 0x42B318: execcmd (exec.c:2619)
==9392==    by 0x428CA0: execpline2 (exec.c:1697)
==9392==    by 0x427FD2: execpline (exec.c:1484)
==9392==    by 0x427756: execlist (exec.c:1267)
==9392==    by 0x42717C: execode (exec.c:1073)
==9392==    by 0x431299: runshfunc (exec.c:5040)
==9392==    by 0x430E76: doshfunc (exec.c:4920)
==9392==    by 0x4302FB: execshfunc (exec.c:4557)
==9392==    by 0x42D8C1: execcmd (exec.c:3373)
==9392== 
==9392== 
==9392== 2 errors in context 2 of 2:
==9392== Conditional jump or move depends on uninitialised value(s)
==9392==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9392==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9392==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9392==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9392==    by 0x42D8E9: execcmd (exec.c:3378)
==9392==    by 0x428CA0: execpline2 (exec.c:1697)
==9392==    by 0x427FD2: execpline (exec.c:1484)
==9392==    by 0x42779A: execlist (exec.c:1275)
==9392==    by 0x42717C: execode (exec.c:1073)
==9392==    by 0x431299: runshfunc (exec.c:5040)
==9392==    by 0x430E76: doshfunc (exec.c:4920)
==9392==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9392== 
==9392== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9393== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9393-by-pythonnut-on-???
==9393== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9393-by-pythonnut-on-???
==9393== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9393-by-pythonnut-on-???
==9393== 
==9393== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9393== don't want to do, unless you know exactly what you're doing,
==9393== or are doing some strange experiment):
==9393==   /usr/lib/valgrind/../../bin/vgdb --pid=9393 ...command...
==9393== 
==9393== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9393==   /path/to/gdb ./zsh
==9393== and then give GDB the following command
==9393==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9393
==9393== --pid is optional if only one valgrind process is running
==9393== 
==9396== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9396-by-pythonnut-on-???
==9396== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9396-by-pythonnut-on-???
==9396== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9396-by-pythonnut-on-???
==9396== 
==9396== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9396== don't want to do, unless you know exactly what you're doing,
==9396== or are doing some strange experiment):
==9396==   /usr/lib/valgrind/../../bin/vgdb --pid=9396 ...command...
==9396== 
==9396== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9396==   /path/to/gdb ./zsh
==9396== and then give GDB the following command
==9396==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9396
==9396== --pid is optional if only one valgrind process is running
==9396== 
==9397== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9397-by-pythonnut-on-???
==9397== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9397-by-pythonnut-on-???
==9397== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9397-by-pythonnut-on-???
==9397== 
==9397== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9397== don't want to do, unless you know exactly what you're doing,
==9397== or are doing some strange experiment):
==9397==   /usr/lib/valgrind/../../bin/vgdb --pid=9397 ...command...
==9397== 
==9397== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9397==   /path/to/gdb ./zsh
==9397== and then give GDB the following command
==9397==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9397
==9397== --pid is optional if only one valgrind process is running
==9397== 
==9395== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9395-by-pythonnut-on-???
==9395== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9395-by-pythonnut-on-???
==9395== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9395-by-pythonnut-on-???
==9395== 
==9395== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9395== don't want to do, unless you know exactly what you're doing,
==9395== or are doing some strange experiment):
==9395==   /usr/lib/valgrind/../../bin/vgdb --pid=9395 ...command...
==9395== 
==9395== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9395==   /path/to/gdb ./zsh
==9395== and then give GDB the following command
==9395==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9395
==9395== --pid is optional if only one valgrind process is running
==9395== 
==9399== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9399-by-pythonnut-on-???
==9399== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9399-by-pythonnut-on-???
==9399== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9399-by-pythonnut-on-???
==9399== 
==9399== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9399== don't want to do, unless you know exactly what you're doing,
==9399== or are doing some strange experiment):
==9399==   /usr/lib/valgrind/../../bin/vgdb --pid=9399 ...command...
==9399== 
==9399== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9399==   /path/to/gdb ./zsh
==9399== and then give GDB the following command
==9399==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9399
==9399== --pid is optional if only one valgrind process is running
==9399== 
==9400== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9400-by-pythonnut-on-???
==9400== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9400-by-pythonnut-on-???
==9400== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9400-by-pythonnut-on-???
==9400== 
==9400== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9400== don't want to do, unless you know exactly what you're doing,
==9400== or are doing some strange experiment):
==9400==   /usr/lib/valgrind/../../bin/vgdb --pid=9400 ...command...
==9400== 
==9400== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9400==   /path/to/gdb ./zsh
==9400== and then give GDB the following command
==9400==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9400
==9400== --pid is optional if only one valgrind process is running
==9400== 
==9401== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9401-by-pythonnut-on-???
==9401== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9401-by-pythonnut-on-???
==9401== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9401-by-pythonnut-on-???
==9401== 
==9401== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9401== don't want to do, unless you know exactly what you're doing,
==9401== or are doing some strange experiment):
==9401==   /usr/lib/valgrind/../../bin/vgdb --pid=9401 ...command...
==9401== 
==9401== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9401==   /path/to/gdb ./zsh
==9401== and then give GDB the following command
==9401==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9401
==9401== --pid is optional if only one valgrind process is running
==9401== 
--9401-- Caught __NR_exit; running __libc_freeres()
==9404== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9404-by-pythonnut-on-???
==9404== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9404-by-pythonnut-on-???
==9404== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9404-by-pythonnut-on-???
==9404== 
==9404== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9404== don't want to do, unless you know exactly what you're doing,
==9404== or are doing some strange experiment):
==9404==   /usr/lib/valgrind/../../bin/vgdb --pid=9404 ...command...
==9404== 
==9404== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9404==   /path/to/gdb ./zsh
==9404== and then give GDB the following command
==9404==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9404
==9404== --pid is optional if only one valgrind process is running
==9404== 
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9402== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9402-by-pythonnut-on-???
==9402== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9402-by-pythonnut-on-???
==9402== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9402-by-pythonnut-on-???
==9402== 
==9402== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9402== don't want to do, unless you know exactly what you're doing,
==9402== or are doing some strange experiment):
==9402==   /usr/lib/valgrind/../../bin/vgdb --pid=9402 ...command...
==9402== 
==9402== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9402==   /path/to/gdb ./zsh
==9402== and then give GDB the following command
==9402==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9402
==9402== --pid is optional if only one valgrind process is running
==9402== 
--9402-- Caught __NR_exit; running __libc_freeres()
--9401-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9401== 
==9401== HEAP SUMMARY:
==9401==     in use at exit: 3,115,859 bytes in 68,911 blocks
==9401==   total heap usage: 935,498 allocs, 866,587 frees, 66,334,915 bytes allocated
==9401== 
--9402-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9402== 
==9402== HEAP SUMMARY:
==9402==     in use at exit: 3,117,104 bytes in 68,900 blocks
==9402==   total heap usage: 935,488 allocs, 866,588 frees, 66,577,191 bytes allocated
==9402== 
==9401== Searching for pointers to 68,911 not-freed blocks
--9401--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9401--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9401--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9401--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9401--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9401--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9401--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9401--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9401--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9401--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9401--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9401--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9401--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9401--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9401--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9401--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9401--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9401--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9401--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9401--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9401--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9401--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9401--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9401--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9401--   Scanning root segment: 0x701a000..0x701afff (4096)
--9401--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9401--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9401--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9401--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9401--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9401--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9401--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9401--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9401--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9397-- Caught __NR_exit; running __libc_freeres()
==9402== Searching for pointers to 68,900 not-freed blocks
--9402--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9402--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9402--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9402--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9402--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9402--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9402--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9402--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9402--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9402--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9402--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9402--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9402--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9402--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9402--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9402--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9402--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9402--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9402--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9402--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9402--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9402--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9402--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9402--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9402--   Scanning root segment: 0x701a000..0x701afff (4096)
--9402--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9402--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9402--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9402--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9402--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9402--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9402--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9402--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9402--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9397-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9397== 
==9397== HEAP SUMMARY:
==9397==     in use at exit: 3,122,699 bytes in 69,131 blocks
==9397==   total heap usage: 936,603 allocs, 867,472 frees, 66,957,364 bytes allocated
==9397== 
==9397== Searching for pointers to 69,131 not-freed blocks
--9397--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9397--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9397--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9397--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9397--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9397--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9397--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9397--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9397--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9397--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9397--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9397--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9397--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9397--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9397--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9397--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9397--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9397--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9397--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9397--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9397--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9397--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9397--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9397--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9397--   Scanning root segment: 0x701a000..0x701afff (4096)
--9397--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9397--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9397--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9397--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9397--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9397--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9397--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9397--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9397--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9401== Checked 4,778,472 bytes
==9401== 
==9401== LEAK SUMMARY:
==9401==    definitely lost: 1,533 bytes in 8 blocks
==9401==    indirectly lost: 6,756 bytes in 7 blocks
==9401==      possibly lost: 0 bytes in 0 blocks
==9401==    still reachable: 3,107,570 bytes in 68,896 blocks
==9401==         suppressed: 0 bytes in 0 blocks
==9401== Rerun with --leak-check=full to see details of leaked memory
==9401== 
==9401== Use --track-origins=yes to see where uninitialised values come from
==9401== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9401== 
==9401== 1 errors in context 1 of 2:
==9401== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9401==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9401==    by 0x488CD0: stringsubst (subst.c:301)
==9401==    by 0x48801B: prefork (subst.c:77)
==9401==    by 0x42B318: execcmd (exec.c:2619)
==9401==    by 0x428CA0: execpline2 (exec.c:1697)
==9401==    by 0x427FD2: execpline (exec.c:1484)
==9401==    by 0x427756: execlist (exec.c:1267)
==9401==    by 0x42717C: execode (exec.c:1073)
==9401==    by 0x431299: runshfunc (exec.c:5040)
==9401==    by 0x430E76: doshfunc (exec.c:4920)
==9401==    by 0x4302FB: execshfunc (exec.c:4557)
==9401==    by 0x42D8C1: execcmd (exec.c:3373)
==9401== 
==9401== 
==9401== 2 errors in context 2 of 2:
==9401== Conditional jump or move depends on uninitialised value(s)
==9401==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9401==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9401==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9401==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9401==    by 0x42D8E9: execcmd (exec.c:3378)
==9401==    by 0x428CA0: execpline2 (exec.c:1697)
==9401==    by 0x427FD2: execpline (exec.c:1484)
==9401==    by 0x42779A: execlist (exec.c:1275)
==9401==    by 0x42717C: execode (exec.c:1073)
==9401==    by 0x431299: runshfunc (exec.c:5040)
==9401==    by 0x430E76: doshfunc (exec.c:4920)
==9401==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9401== 
==9401== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9398-- Caught __NR_exit; running __libc_freeres()
==9402== Checked 4,764,384 bytes
==9402== 
==9398== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9398-by-pythonnut-on-???
==9398== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9398-by-pythonnut-on-???
==9398== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9398-by-pythonnut-on-???
==9398== 
==9398== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9398== don't want to do, unless you know exactly what you're doing,
==9398== or are doing some strange experiment):
==9398==   /usr/lib/valgrind/../../bin/vgdb --pid=9398 ...command...
==9398== 
==9398== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9398==   /path/to/gdb ./zsh
==9398== and then give GDB the following command
==9398==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9398
==9398== --pid is optional if only one valgrind process is running
==9398== 
==9402== LEAK SUMMARY:
==9402==    definitely lost: 1,533 bytes in 8 blocks
==9402==    indirectly lost: 6,756 bytes in 7 blocks
==9402==      possibly lost: 0 bytes in 0 blocks
==9402==    still reachable: 3,108,815 bytes in 68,885 blocks
==9402==         suppressed: 0 bytes in 0 blocks
==9402== Rerun with --leak-check=full to see details of leaked memory
==9402== 
==9402== Use --track-origins=yes to see where uninitialised values come from
==9402== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9402== 
==9402== 1 errors in context 1 of 2:
==9402== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9402==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9402==    by 0x488CD0: stringsubst (subst.c:301)
==9402==    by 0x48801B: prefork (subst.c:77)
==9402==    by 0x42B318: execcmd (exec.c:2619)
==9402==    by 0x428CA0: execpline2 (exec.c:1697)
==9402==    by 0x427FD2: execpline (exec.c:1484)
==9402==    by 0x427756: execlist (exec.c:1267)
==9402==    by 0x42717C: execode (exec.c:1073)
==9402==    by 0x431299: runshfunc (exec.c:5040)
==9402==    by 0x430E76: doshfunc (exec.c:4920)
==9402==    by 0x4302FB: execshfunc (exec.c:4557)
==9402==    by 0x42D8C1: execcmd (exec.c:3373)
==9402== 
==9402== 
==9402== 2 errors in context 2 of 2:
==9402== Conditional jump or move depends on uninitialised value(s)
==9402==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9402==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9402==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9402==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9402==    by 0x42D8E9: execcmd (exec.c:3378)
==9402==    by 0x428CA0: execpline2 (exec.c:1697)
==9402==    by 0x427FD2: execpline (exec.c:1484)
==9402==    by 0x42779A: execlist (exec.c:1275)
==9402==    by 0x42717C: execode (exec.c:1073)
==9402==    by 0x431299: runshfunc (exec.c:5040)
==9402==    by 0x430E76: doshfunc (exec.c:4920)
==9402==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9402== 
==9402== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9398-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9398== 
--9407-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9398== HEAP SUMMARY:
==9398==     in use at exit: 3,115,795 bytes in 68,908 blocks
==9398==   total heap usage: 935,496 allocs, 866,588 frees, 66,334,674 bytes allocated
==9398== 
==9407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9407-by-pythonnut-on-???
==9407== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9407-by-pythonnut-on-???
==9407== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9407-by-pythonnut-on-???
==9407== 
==9407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9407== don't want to do, unless you know exactly what you're doing,
==9407== or are doing some strange experiment):
==9407==   /usr/lib/valgrind/../../bin/vgdb --pid=9407 ...command...
==9407== 
==9407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9407==   /path/to/gdb ./zsh
==9407== and then give GDB the following command
==9407==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9407
==9407== --pid is optional if only one valgrind process is running
==9407== 
client request: code 4d430005,  addr 0xFFEFF8FCC,  len 4
==9397== Checked 4,789,208 bytes
==9397== 
==9398== Searching for pointers to 68,908 not-freed blocks
--9398--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9398--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9398--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9398--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9398--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9398--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9398--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9398--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9398--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9398--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9398--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9398--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9398--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9398--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9398--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9398--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9398--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9398--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9398--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9398--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9398--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9398--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9398--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9398--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9398--   Scanning root segment: 0x701a000..0x701afff (4096)
--9398--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9398--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9398--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9398--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9398--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9398--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9398--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9398--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9398--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9397== LEAK SUMMARY:
==9397==    definitely lost: 1,533 bytes in 8 blocks
==9397==    indirectly lost: 6,756 bytes in 7 blocks
==9397==      possibly lost: 0 bytes in 0 blocks
==9397==    still reachable: 3,114,410 bytes in 69,116 blocks
==9397==         suppressed: 0 bytes in 0 blocks
==9397== Rerun with --leak-check=full to see details of leaked memory
==9397== 
==9397== Use --track-origins=yes to see where uninitialised values come from
==9397== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9397== 
==9397== 1 errors in context 1 of 2:
==9397== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9397==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9397==    by 0x488CD0: stringsubst (subst.c:301)
==9397==    by 0x48801B: prefork (subst.c:77)
==9397==    by 0x42B318: execcmd (exec.c:2619)
==9397==    by 0x428CA0: execpline2 (exec.c:1697)
==9397==    by 0x427FD2: execpline (exec.c:1484)
==9397==    by 0x427756: execlist (exec.c:1267)
==9397==    by 0x42717C: execode (exec.c:1073)
==9397==    by 0x431299: runshfunc (exec.c:5040)
==9397==    by 0x430E76: doshfunc (exec.c:4920)
==9397==    by 0x4302FB: execshfunc (exec.c:4557)
==9397==    by 0x42D8C1: execcmd (exec.c:3373)
==9397== 
==9397== 
==9397== 2 errors in context 2 of 2:
==9397== Conditional jump or move depends on uninitialised value(s)
==9397==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9397==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9397==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9397==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9397==    by 0x42D8E9: execcmd (exec.c:3378)
==9397==    by 0x428CA0: execpline2 (exec.c:1697)
==9397==    by 0x427FD2: execpline (exec.c:1484)
==9397==    by 0x42779A: execlist (exec.c:1275)
==9397==    by 0x42717C: execode (exec.c:1073)
==9397==    by 0x431299: runshfunc (exec.c:5040)
==9397==    by 0x430E76: doshfunc (exec.c:4920)
==9397==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9397== 
==9397== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF5FBC,  len 4
==9408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9408-by-pythonnut-on-???
==9408== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9408-by-pythonnut-on-???
==9408== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9408-by-pythonnut-on-???
==9408== 
==9408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9408== don't want to do, unless you know exactly what you're doing,
==9408== or are doing some strange experiment):
==9408==   /usr/lib/valgrind/../../bin/vgdb --pid=9408 ...command...
==9408== 
==9408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9408==   /path/to/gdb ./zsh
==9408== and then give GDB the following command
==9408==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9408
==9408== --pid is optional if only one valgrind process is running
==9408== 
--9408-- Caught __NR_exit; running __libc_freeres()
--9408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9408== 
==9408== HEAP SUMMARY:
==9408==     in use at exit: 3,122,769 bytes in 69,141 blocks
==9408==   total heap usage: 935,602 allocs, 866,461 frees, 66,702,156 bytes allocated
==9408== 
==9408== Searching for pointers to 69,141 not-freed blocks
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
--9408--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9408--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9408--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9408--   Scanning root segment: 0x4037000..0x403afff (16384)
--9408--   Scanning root segment: 0x4049000..0x404cfff (16384)
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
--9408--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9408--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9408--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9408--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9408--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9408--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9408--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9408--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9408--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9408--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9408--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9408--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9408--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9408--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9408--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9408--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9408--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9408--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9408--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9408--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9408--   Scanning root segment: 0x701a000..0x701afff (4096)
--9408--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9408--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9408--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9408--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9408--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9408--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9408--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9408--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9408--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9398== Checked 4,777,784 bytes
==9398== 
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF65AC,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==9398== LEAK SUMMARY:
==9398==    definitely lost: 1,533 bytes in 8 blocks
==9398==    indirectly lost: 6,756 bytes in 7 blocks
==9398==      possibly lost: 0 bytes in 0 blocks
==9398==    still reachable: 3,107,506 bytes in 68,893 blocks
==9398==         suppressed: 0 bytes in 0 blocks
==9398== Rerun with --leak-check=full to see details of leaked memory
==9398== 
==9398== Use --track-origins=yes to see where uninitialised values come from
==9398== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9398== 
==9398== 1 errors in context 1 of 2:
==9398== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9398==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9398==    by 0x488CD0: stringsubst (subst.c:301)
==9398==    by 0x48801B: prefork (subst.c:77)
==9398==    by 0x42B318: execcmd (exec.c:2619)
==9398==    by 0x428CA0: execpline2 (exec.c:1697)
==9398==    by 0x427FD2: execpline (exec.c:1484)
==9398==    by 0x427756: execlist (exec.c:1267)
==9398==    by 0x42717C: execode (exec.c:1073)
==9398==    by 0x431299: runshfunc (exec.c:5040)
==9398==    by 0x430E76: doshfunc (exec.c:4920)
==9398==    by 0x4302FB: execshfunc (exec.c:4557)
==9398==    by 0x42D8C1: execcmd (exec.c:3373)
==9398== 
==9398== 
==9398== 2 errors in context 2 of 2:
==9398== Conditional jump or move depends on uninitialised value(s)
==9398==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9398==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9398==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9398==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9398==    by 0x42D8E9: execcmd (exec.c:3378)
==9398==    by 0x428CA0: execpline2 (exec.c:1697)
==9398==    by 0x427FD2: execpline (exec.c:1484)
==9398==    by 0x42779A: execlist (exec.c:1275)
==9398==    by 0x42717C: execode (exec.c:1073)
==9398==    by 0x431299: runshfunc (exec.c:5040)
==9398==    by 0x430E76: doshfunc (exec.c:4920)
==9398==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9398== 
==9398== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEC84C,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==9411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9411-by-pythonnut-on-???
==9411== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9411-by-pythonnut-on-???
==9411== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9411-by-pythonnut-on-???
==9411== 
==9411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9411== don't want to do, unless you know exactly what you're doing,
==9411== or are doing some strange experiment):
==9411==   /usr/lib/valgrind/../../bin/vgdb --pid=9411 ...command...
==9411== 
==9411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9411==   /path/to/gdb ./zsh
==9411== and then give GDB the following command
==9411==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9411
==9411== --pid is optional if only one valgrind process is running
==9411== 
--9410-- Caught __NR_exit; running __libc_freeres()
==9410== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9410-by-pythonnut-on-???
==9410== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9410-by-pythonnut-on-???
==9410== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9410-by-pythonnut-on-???
==9410== 
==9410== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9410== don't want to do, unless you know exactly what you're doing,
==9410== or are doing some strange experiment):
==9410==   /usr/lib/valgrind/../../bin/vgdb --pid=9410 ...command...
==9410== 
==9410== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9410==   /path/to/gdb ./zsh
==9410== and then give GDB the following command
==9410==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9410
==9410== --pid is optional if only one valgrind process is running
==9410== 
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
==9412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9412-by-pythonnut-on-???
==9412== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9412-by-pythonnut-on-???
==9412== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9412-by-pythonnut-on-???
==9412== 
==9412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9412== don't want to do, unless you know exactly what you're doing,
==9412== or are doing some strange experiment):
==9412==   /usr/lib/valgrind/../../bin/vgdb --pid=9412 ...command...
==9412== 
==9412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9412==   /path/to/gdb ./zsh
==9412== and then give GDB the following command
==9412==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9412
==9412== --pid is optional if only one valgrind process is running
==9412== 
==9408== Checked 4,806,376 bytes
==9408== 
--9410-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9412-- Caught __NR_exit; running __libc_freeres()
==9410== 
==9410== HEAP SUMMARY:
==9410==     in use at exit: 3,115,802 bytes in 68,908 blocks
==9410==   total heap usage: 935,511 allocs, 866,603 frees, 66,339,672 bytes allocated
==9410== 
==9408== LEAK SUMMARY:
==9408==    definitely lost: 1,533 bytes in 8 blocks
==9408==    indirectly lost: 6,756 bytes in 7 blocks
==9408==      possibly lost: 0 bytes in 0 blocks
==9408==    still reachable: 3,114,480 bytes in 69,126 blocks
==9408==         suppressed: 0 bytes in 0 blocks
==9408== Rerun with --leak-check=full to see details of leaked memory
==9408== 
==9408== Use --track-origins=yes to see where uninitialised values come from
==9408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9408== 
==9408== 1 errors in context 1 of 2:
==9408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9408==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9408==    by 0x488CD0: stringsubst (subst.c:301)
==9408==    by 0x48801B: prefork (subst.c:77)
==9408==    by 0x42B318: execcmd (exec.c:2619)
==9408==    by 0x428CA0: execpline2 (exec.c:1697)
==9408==    by 0x427FD2: execpline (exec.c:1484)
==9408==    by 0x427756: execlist (exec.c:1267)
==9408==    by 0x42717C: execode (exec.c:1073)
==9408==    by 0x431299: runshfunc (exec.c:5040)
==9408==    by 0x430E76: doshfunc (exec.c:4920)
==9408==    by 0x4302FB: execshfunc (exec.c:4557)
==9408==    by 0x42D8C1: execcmd (exec.c:3373)
==9408== 
==9408== 
==9408== 2 errors in context 2 of 2:
==9408== Conditional jump or move depends on uninitialised value(s)
==9408==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9408==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9408==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9408==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9408==    by 0x42D8E9: execcmd (exec.c:3378)
==9408==    by 0x428CA0: execpline2 (exec.c:1697)
==9408==    by 0x427FD2: execpline (exec.c:1484)
==9408==    by 0x42779A: execlist (exec.c:1275)
==9408==    by 0x42717C: execode (exec.c:1073)
==9408==    by 0x431299: runshfunc (exec.c:5040)
==9408==    by 0x430E76: doshfunc (exec.c:4920)
==9408==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9408== 
==9408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9413-by-pythonnut-on-???
==9413== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9413-by-pythonnut-on-???
==9413== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9413-by-pythonnut-on-???
==9413== 
==9413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9413== don't want to do, unless you know exactly what you're doing,
==9413== or are doing some strange experiment):
==9413==   /usr/lib/valgrind/../../bin/vgdb --pid=9413 ...command...
==9413== 
==9413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9413==   /path/to/gdb ./zsh
==9413== and then give GDB the following command
==9413==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9413
==9413== --pid is optional if only one valgrind process is running
==9413== 
==9412== 
==9410== Searching for pointers to 68,908 not-freed blocks
==9412== HEAP SUMMARY:
==9412==     in use at exit: 3,148,814 bytes in 69,398 blocks
==9412==   total heap usage: 939,263 allocs, 869,865 frees, 68,347,262 bytes allocated
==9412== 
--9410--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9410--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9410--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9410--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9410--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9410--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9410--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9410--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9410--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9410--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9410--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9410--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9410--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9410--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9410--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9410--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9410--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9410--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9410--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9410--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9410--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9410--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9410--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9410--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9410--   Scanning root segment: 0x701a000..0x701afff (4096)
--9410--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9410--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9410--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9410--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9410--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9410--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9410--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9410--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9410--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9413-- Caught __NR_exit; running __libc_freeres()
==9412== Searching for pointers to 69,398 not-freed blocks
--9412--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9412--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9412--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9412--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9412--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9412--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9412--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9412--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9412--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9412--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9412--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9412--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9412--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9412--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9412--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9412--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9412--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9412--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9412--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9412--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9412--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9412--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9412--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9412--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9412--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9412--   Scanning root segment: 0x701a000..0x701afff (4096)
--9412--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9412--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9412--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9412--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9412--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9412--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9412--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9412--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9412--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9413== 
==9413== HEAP SUMMARY:
==9413==     in use at exit: 3,122,842 bytes in 69,142 blocks
==9413==   total heap usage: 935,632 allocs, 866,490 frees, 66,708,096 bytes allocated
==9413== 
==9413== Searching for pointers to 69,142 not-freed blocks
--9413--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9413--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9413--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9413--   Scanning root segment: 0x4037000..0x403afff (16384)
--9413--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9413--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9413--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9413--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9413--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9413--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9413--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9413--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9413--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9413--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9413--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9413--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9413--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9413--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9413--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9413--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9413--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9413--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9413--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9413--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9413--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9413--   Scanning root segment: 0x701a000..0x701afff (4096)
--9413--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9413--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9413--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9413--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9413--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9413--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9413--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9413--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9413--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9410== Checked 4,777,920 bytes
==9410== 
==9410== LEAK SUMMARY:
==9410==    definitely lost: 1,533 bytes in 8 blocks
==9410==    indirectly lost: 6,756 bytes in 7 blocks
==9410==      possibly lost: 0 bytes in 0 blocks
==9410==    still reachable: 3,107,513 bytes in 68,893 blocks
==9410==         suppressed: 0 bytes in 0 blocks
==9410== Rerun with --leak-check=full to see details of leaked memory
==9410== 
==9410== Use --track-origins=yes to see where uninitialised values come from
==9410== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9410== 
==9410== 1 errors in context 1 of 2:
==9410== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9410==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9410==    by 0x488CD0: stringsubst (subst.c:301)
==9410==    by 0x48801B: prefork (subst.c:77)
==9410==    by 0x42B318: execcmd (exec.c:2619)
==9410==    by 0x428CA0: execpline2 (exec.c:1697)
==9410==    by 0x427FD2: execpline (exec.c:1484)
==9410==    by 0x427756: execlist (exec.c:1267)
==9410==    by 0x42717C: execode (exec.c:1073)
==9410==    by 0x431299: runshfunc (exec.c:5040)
==9410==    by 0x430E76: doshfunc (exec.c:4920)
==9410==    by 0x4302FB: execshfunc (exec.c:4557)
==9410==    by 0x42D8C1: execcmd (exec.c:3373)
==9410== 
==9410== 
==9410== 2 errors in context 2 of 2:
==9410== Conditional jump or move depends on uninitialised value(s)
==9410==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9410==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9410==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9410==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9410==    by 0x42D8E9: execcmd (exec.c:3378)
==9410==    by 0x428CA0: execpline2 (exec.c:1697)
==9410==    by 0x427FD2: execpline (exec.c:1484)
==9410==    by 0x42779A: execlist (exec.c:1275)
==9410==    by 0x42717C: execode (exec.c:1073)
==9410==    by 0x431299: runshfunc (exec.c:5040)
==9410==    by 0x430E76: doshfunc (exec.c:4920)
==9410==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9410== 
==9410== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9412== Checked 4,852,480 bytes
==9412== 
--9414-- Caught __NR_exit; running __libc_freeres()
==9412== LEAK SUMMARY:
==9412==    definitely lost: 1,533 bytes in 8 blocks
==9412==    indirectly lost: 6,756 bytes in 7 blocks
==9412==      possibly lost: 0 bytes in 0 blocks
==9412==    still reachable: 3,140,525 bytes in 69,383 blocks
==9412==         suppressed: 0 bytes in 0 blocks
==9412== Rerun with --leak-check=full to see details of leaked memory
==9412== 
==9412== Use --track-origins=yes to see where uninitialised values come from
==9412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9412== 
==9412== 1 errors in context 1 of 2:
==9412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9412==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9412==    by 0x488CD0: stringsubst (subst.c:301)
==9412==    by 0x48801B: prefork (subst.c:77)
==9412==    by 0x42B318: execcmd (exec.c:2619)
==9412==    by 0x428CA0: execpline2 (exec.c:1697)
==9412==    by 0x427FD2: execpline (exec.c:1484)
==9412==    by 0x427756: execlist (exec.c:1267)
==9412==    by 0x42717C: execode (exec.c:1073)
==9412==    by 0x431299: runshfunc (exec.c:5040)
==9412==    by 0x430E76: doshfunc (exec.c:4920)
==9412==    by 0x4302FB: execshfunc (exec.c:4557)
==9412==    by 0x42D8C1: execcmd (exec.c:3373)
==9412== 
==9412== 
==9412== 2 errors in context 2 of 2:
==9412== Conditional jump or move depends on uninitialised value(s)
==9412==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9412==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9412==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9412==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9412==    by 0x42D8E9: execcmd (exec.c:3378)
==9412==    by 0x428CA0: execpline2 (exec.c:1697)
==9412==    by 0x427FD2: execpline (exec.c:1484)
==9412==    by 0x42779A: execlist (exec.c:1275)
==9412==    by 0x42717C: execode (exec.c:1073)
==9412==    by 0x431299: runshfunc (exec.c:5040)
==9412==    by 0x430E76: doshfunc (exec.c:4920)
==9412==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9412== 
==9412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9414== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9414-by-pythonnut-on-???
==9414== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9414-by-pythonnut-on-???
==9414== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9414-by-pythonnut-on-???
==9414== 
==9414== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9414== don't want to do, unless you know exactly what you're doing,
==9414== or are doing some strange experiment):
==9414==   /usr/lib/valgrind/../../bin/vgdb --pid=9414 ...command...
==9414== 
==9414== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9414==   /path/to/gdb ./zsh
==9414== and then give GDB the following command
==9414==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9414
==9414== --pid is optional if only one valgrind process is running
==9414== 
--9411-- Caught __NR_exit; running __libc_freeres()
==9413== Checked 4,806,440 bytes
==9413== 
--9414-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9414== 
==9414== HEAP SUMMARY:
==9414==     in use at exit: 3,115,962 bytes in 68,909 blocks
==9414==   total heap usage: 935,528 allocs, 866,619 frees, 66,344,523 bytes allocated
==9414== 
--9411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9413== LEAK SUMMARY:
==9413==    definitely lost: 1,533 bytes in 8 blocks
==9413==    indirectly lost: 6,756 bytes in 7 blocks
==9413==      possibly lost: 0 bytes in 0 blocks
==9413==    still reachable: 3,114,553 bytes in 69,127 blocks
==9413==         suppressed: 0 bytes in 0 blocks
==9413== Rerun with --leak-check=full to see details of leaked memory
==9413== 
==9413== Use --track-origins=yes to see where uninitialised values come from
==9413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9413== 
==9413== 1 errors in context 1 of 2:
==9413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9413==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9413==    by 0x488CD0: stringsubst (subst.c:301)
==9413==    by 0x48801B: prefork (subst.c:77)
==9413==    by 0x42B318: execcmd (exec.c:2619)
==9413==    by 0x428CA0: execpline2 (exec.c:1697)
==9413==    by 0x427FD2: execpline (exec.c:1484)
==9413==    by 0x427756: execlist (exec.c:1267)
==9413==    by 0x42717C: execode (exec.c:1073)
==9413==    by 0x431299: runshfunc (exec.c:5040)
==9413==    by 0x430E76: doshfunc (exec.c:4920)
==9413==    by 0x4302FB: execshfunc (exec.c:4557)
==9413==    by 0x42D8C1: execcmd (exec.c:3373)
==9413== 
==9413== 
==9413== 2 errors in context 2 of 2:
==9413== Conditional jump or move depends on uninitialised value(s)
==9413==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9413==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9413==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9413==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9413==    by 0x42D8E9: execcmd (exec.c:3378)
==9413==    by 0x428CA0: execpline2 (exec.c:1697)
==9413==    by 0x427FD2: execpline (exec.c:1484)
==9413==    by 0x42779A: execlist (exec.c:1275)
==9413==    by 0x42717C: execode (exec.c:1073)
==9413==    by 0x431299: runshfunc (exec.c:5040)
==9413==    by 0x430E76: doshfunc (exec.c:4920)
==9413==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9413== 
==9413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== 
==9411== HEAP SUMMARY:
==9411==     in use at exit: 3,146,532 bytes in 69,318 blocks
==9411==   total heap usage: 939,168 allocs, 869,850 frees, 68,115,323 bytes allocated
==9411== 
==9415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9415-by-pythonnut-on-???
==9415== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9415-by-pythonnut-on-???
==9415== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9415-by-pythonnut-on-???
==9415== 
==9415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9415== don't want to do, unless you know exactly what you're doing,
==9415== or are doing some strange experiment):
==9415==   /usr/lib/valgrind/../../bin/vgdb --pid=9415 ...command...
==9415== 
==9415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9415==   /path/to/gdb ./zsh
==9415== and then give GDB the following command
==9415==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9415
==9415== --pid is optional if only one valgrind process is running
==9415== 
==9414== Searching for pointers to 68,909 not-freed blocks
--9414--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9414--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9414--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9414--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9414--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9414--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9414--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9414--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9414--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9414--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9414--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9414--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9414--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9414--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9414--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9414--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9414--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9414--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9414--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9414--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9414--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9414--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9414--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9414--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9414--   Scanning root segment: 0x701a000..0x701afff (4096)
--9414--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9414--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9414--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9414--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9414--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9414--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9414--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9414--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9414--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9415-- Caught __NR_exit; running __libc_freeres()
==9411== Searching for pointers to 69,318 not-freed blocks
--9411--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9411--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9411--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9411--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9411--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9411--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9411--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9411--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9411--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9411--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9411--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9411--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9411--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9411--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9411--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9411--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9411--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9411--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9411--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9411--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9411--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9411--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9411--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9411--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9411--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9411--   Scanning root segment: 0x701a000..0x701afff (4096)
--9411--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9411--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9411--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9411--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9411--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9411--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9411--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9411--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9411--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9415-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9415== 
==9415== HEAP SUMMARY:
==9415==     in use at exit: 3,122,841 bytes in 69,142 blocks
==9415==   total heap usage: 935,661 allocs, 866,519 frees, 66,713,972 bytes allocated
==9415== 
==9415== Searching for pointers to 69,142 not-freed blocks
--9415--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9415--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9415--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9415--   Scanning root segment: 0x4037000..0x403afff (16384)
--9415--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9415--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9415--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9415--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9415--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9415--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9415--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9415--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9415--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9415--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9415--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9415--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9415--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9415--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9415--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9415--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9415--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9415--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9415--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9415--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9415--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9415--   Scanning root segment: 0x701a000..0x701afff (4096)
--9415--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9415--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9415--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9415--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9415--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9415--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9415--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9415--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9415--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9414== Checked 4,777,264 bytes
==9414== 
==9411== Checked 4,848,504 bytes
==9411== 
==9414== LEAK SUMMARY:
==9414==    definitely lost: 1,533 bytes in 8 blocks
==9414==    indirectly lost: 6,756 bytes in 7 blocks
==9414==      possibly lost: 0 bytes in 0 blocks
==9414==    still reachable: 3,107,673 bytes in 68,894 blocks
==9414==         suppressed: 0 bytes in 0 blocks
==9414== Rerun with --leak-check=full to see details of leaked memory
==9414== 
==9414== Use --track-origins=yes to see where uninitialised values come from
==9414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9414== 
==9414== 1 errors in context 1 of 2:
==9414== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9414==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9414==    by 0x488CD0: stringsubst (subst.c:301)
==9414==    by 0x48801B: prefork (subst.c:77)
==9414==    by 0x42B318: execcmd (exec.c:2619)
==9414==    by 0x428CA0: execpline2 (exec.c:1697)
==9414==    by 0x427FD2: execpline (exec.c:1484)
==9414==    by 0x427756: execlist (exec.c:1267)
==9414==    by 0x42717C: execode (exec.c:1073)
==9414==    by 0x431299: runshfunc (exec.c:5040)
==9414==    by 0x430E76: doshfunc (exec.c:4920)
==9414==    by 0x4302FB: execshfunc (exec.c:4557)
==9414==    by 0x42D8C1: execcmd (exec.c:3373)
==9414== 
==9414== 
==9414== 2 errors in context 2 of 2:
==9414== Conditional jump or move depends on uninitialised value(s)
==9414==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9414==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9414==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9414==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9414==    by 0x42D8E9: execcmd (exec.c:3378)
==9414==    by 0x428CA0: execpline2 (exec.c:1697)
==9414==    by 0x427FD2: execpline (exec.c:1484)
==9414==    by 0x42779A: execlist (exec.c:1275)
==9414==    by 0x42717C: execode (exec.c:1073)
==9414==    by 0x431299: runshfunc (exec.c:5040)
==9414==    by 0x430E76: doshfunc (exec.c:4920)
==9414==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9414== 
==9414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== LEAK SUMMARY:
==9411==    definitely lost: 1,533 bytes in 8 blocks
==9411==    indirectly lost: 6,756 bytes in 7 blocks
==9411==      possibly lost: 0 bytes in 0 blocks
==9411==    still reachable: 3,138,243 bytes in 69,303 blocks
==9411==         suppressed: 0 bytes in 0 blocks
==9411== Rerun with --leak-check=full to see details of leaked memory
==9411== 
==9411== Use --track-origins=yes to see where uninitialised values come from
==9411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== 
==9411== 1 errors in context 1 of 2:
==9411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9411==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9411==    by 0x488CD0: stringsubst (subst.c:301)
==9411==    by 0x48801B: prefork (subst.c:77)
==9411==    by 0x42B318: execcmd (exec.c:2619)
==9411==    by 0x428CA0: execpline2 (exec.c:1697)
==9411==    by 0x427FD2: execpline (exec.c:1484)
==9411==    by 0x427756: execlist (exec.c:1267)
==9411==    by 0x42717C: execode (exec.c:1073)
==9411==    by 0x431299: runshfunc (exec.c:5040)
==9411==    by 0x430E76: doshfunc (exec.c:4920)
==9411==    by 0x4302FB: execshfunc (exec.c:4557)
==9411==    by 0x42D8C1: execcmd (exec.c:3373)
==9411== 
==9411== 
==9411== 2 errors in context 2 of 2:
==9411== Conditional jump or move depends on uninitialised value(s)
==9411==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9411==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9411==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9411==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9411==    by 0x42D8E9: execcmd (exec.c:3378)
==9411==    by 0x428CA0: execpline2 (exec.c:1697)
==9411==    by 0x427FD2: execpline (exec.c:1484)
==9411==    by 0x42779A: execlist (exec.c:1275)
==9411==    by 0x42717C: execode (exec.c:1073)
==9411==    by 0x431299: runshfunc (exec.c:5040)
==9411==    by 0x430E76: doshfunc (exec.c:4920)
==9411==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9411== 
==9411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9417-by-pythonnut-on-???
==9417== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9417-by-pythonnut-on-???
==9417== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9417-by-pythonnut-on-???
==9417== 
==9417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9417== don't want to do, unless you know exactly what you're doing,
==9417== or are doing some strange experiment):
==9417==   /usr/lib/valgrind/../../bin/vgdb --pid=9417 ...command...
==9417== 
==9417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9417==   /path/to/gdb ./zsh
==9417== and then give GDB the following command
==9417==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9417
==9417== --pid is optional if only one valgrind process is running
==9417== 
==9416== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9416-by-pythonnut-on-???
==9416== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9416-by-pythonnut-on-???
==9416== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9416-by-pythonnut-on-???
==9416== 
==9416== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9416== don't want to do, unless you know exactly what you're doing,
==9416== or are doing some strange experiment):
==9416==   /usr/lib/valgrind/../../bin/vgdb --pid=9416 ...command...
==9416== 
==9416== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9416==   /path/to/gdb ./zsh
==9416== and then give GDB the following command
==9416==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9416
==9416== --pid is optional if only one valgrind process is running
==9416== 
--9416-- Caught __NR_exit; running __libc_freeres()
==9415== Checked 4,806,440 bytes
==9415== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==9418== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9418-by-pythonnut-on-???
==9418== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9418-by-pythonnut-on-???
==9418== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9418-by-pythonnut-on-???
==9418== 
==9418== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9418== don't want to do, unless you know exactly what you're doing,
==9418== or are doing some strange experiment):
==9418==   /usr/lib/valgrind/../../bin/vgdb --pid=9418 ...command...
==9418== 
==9418== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9418==   /path/to/gdb ./zsh
==9418== and then give GDB the following command
==9418==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9418
==9418== --pid is optional if only one valgrind process is running
==9418== 
--9418-- Caught __NR_exit; running __libc_freeres()
--9416-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9416== 
==9415== LEAK SUMMARY:
==9415==    definitely lost: 1,533 bytes in 8 blocks
==9415==    indirectly lost: 6,756 bytes in 7 blocks
==9415==      possibly lost: 0 bytes in 0 blocks
==9415==    still reachable: 3,114,552 bytes in 69,127 blocks
==9415==         suppressed: 0 bytes in 0 blocks
==9415== Rerun with --leak-check=full to see details of leaked memory
==9415== 
==9415== Use --track-origins=yes to see where uninitialised values come from
==9415== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9415== 
==9415== 1 errors in context 1 of 2:
==9415== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9415==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9415==    by 0x488CD0: stringsubst (subst.c:301)
==9415==    by 0x48801B: prefork (subst.c:77)
==9415==    by 0x42B318: execcmd (exec.c:2619)
==9415==    by 0x428CA0: execpline2 (exec.c:1697)
==9415==    by 0x427FD2: execpline (exec.c:1484)
==9415==    by 0x427756: execlist (exec.c:1267)
==9415==    by 0x42717C: execode (exec.c:1073)
==9415==    by 0x431299: runshfunc (exec.c:5040)
==9415==    by 0x430E76: doshfunc (exec.c:4920)
==9415==    by 0x4302FB: execshfunc (exec.c:4557)
==9415==    by 0x42D8C1: execcmd (exec.c:3373)
==9415== 
==9415== 
==9415== 2 errors in context 2 of 2:
==9415== Conditional jump or move depends on uninitialised value(s)
==9415==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9415==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9415==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9415==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9415==    by 0x42D8E9: execcmd (exec.c:3378)
==9415==    by 0x428CA0: execpline2 (exec.c:1697)
==9415==    by 0x427FD2: execpline (exec.c:1484)
==9415==    by 0x42779A: execlist (exec.c:1275)
==9415==    by 0x42717C: execode (exec.c:1073)
==9415==    by 0x431299: runshfunc (exec.c:5040)
==9415==    by 0x430E76: doshfunc (exec.c:4920)
==9415==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9415== 
==9415== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9416== HEAP SUMMARY:
==9416==     in use at exit: 3,116,136 bytes in 68,914 blocks
==9416==   total heap usage: 935,575 allocs, 866,661 frees, 66,353,475 bytes allocated
==9416== 
==9419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9419-by-pythonnut-on-???
==9419== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9419-by-pythonnut-on-???
==9419== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9419-by-pythonnut-on-???
==9419== 
==9419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9419== don't want to do, unless you know exactly what you're doing,
==9419== or are doing some strange experiment):
==9419==   /usr/lib/valgrind/../../bin/vgdb --pid=9419 ...command...
==9419== 
==9419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9419==   /path/to/gdb ./zsh
==9419== and then give GDB the following command
==9419==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9419
==9419== --pid is optional if only one valgrind process is running
==9419== 
--9418-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9419-- Caught __NR_exit; running __libc_freeres()
==9418== 
==9416== Searching for pointers to 68,914 not-freed blocks
--9416--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9416--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9416--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9416--   Scanning root segment: 0x4049000..0x404cfff (16384)
==9418== HEAP SUMMARY:
==9418==     in use at exit: 3,149,061 bytes in 69,406 blocks
==9418==   total heap usage: 939,280 allocs, 869,874 frees, 68,317,433 bytes allocated
==9418== 
--9416--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9416--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9416--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9416--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9416--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9416--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9416--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9416--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9416--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9416--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9416--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9416--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9416--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9416--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9416--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9416--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9416--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9416--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9416--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9416--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9416--   Scanning root segment: 0x701a000..0x701afff (4096)
--9416--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9416--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9416--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9416--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9416--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9416--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9416--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9416--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9416--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9418== Searching for pointers to 69,406 not-freed blocks
--9418--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9418--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9419== 
--9418--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9418--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9418--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9418--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9418--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9418--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9418--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9418--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9418--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9418--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9418--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9418--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9418--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9418--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9418--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9418--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9418--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9418--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9418--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9418--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==9419== HEAP SUMMARY:
==9419==     in use at exit: 3,122,843 bytes in 69,142 blocks
==9419==   total heap usage: 935,690 allocs, 866,548 frees, 66,719,849 bytes allocated
==9419== 
--9418--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9418--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9418--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9418--   Scanning root segment: 0x701a000..0x701afff (4096)
--9418--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9418--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9418--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9418--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9418--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9418--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9418--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9418--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9418--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9419== Searching for pointers to 69,142 not-freed blocks
--9419--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9419--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9419--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9419--   Scanning root segment: 0x4037000..0x403afff (16384)
--9419--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9419--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9419--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9419--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9419--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9419--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9419--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9419--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9419--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9419--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9419--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9419--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9419--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9419--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9419--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9419--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9419--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9419--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9419--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9419--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9419--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9419--   Scanning root segment: 0x701a000..0x701afff (4096)
--9419--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9419--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9419--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9419--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9419--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9419--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9419--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9419--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9419--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9416== Checked 4,756,384 bytes
==9416== 
==9416== LEAK SUMMARY:
==9416==    definitely lost: 1,533 bytes in 8 blocks
==9416==    indirectly lost: 6,756 bytes in 7 blocks
==9416==      possibly lost: 0 bytes in 0 blocks
==9416==    still reachable: 3,107,847 bytes in 68,899 blocks
==9416==         suppressed: 0 bytes in 0 blocks
==9416== Rerun with --leak-check=full to see details of leaked memory
==9416== 
==9416== Use --track-origins=yes to see where uninitialised values come from
==9416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9416== 
==9416== 1 errors in context 1 of 2:
==9416== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9416==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9416==    by 0x488CD0: stringsubst (subst.c:301)
==9416==    by 0x48801B: prefork (subst.c:77)
==9416==    by 0x42B318: execcmd (exec.c:2619)
==9416==    by 0x428CA0: execpline2 (exec.c:1697)
==9416==    by 0x427FD2: execpline (exec.c:1484)
==9416==    by 0x427756: execlist (exec.c:1267)
==9416==    by 0x42717C: execode (exec.c:1073)
==9416==    by 0x431299: runshfunc (exec.c:5040)
==9416==    by 0x430E76: doshfunc (exec.c:4920)
==9416==    by 0x4302FB: execshfunc (exec.c:4557)
==9416==    by 0x42D8C1: execcmd (exec.c:3373)
==9416== 
==9416== 
==9416== 2 errors in context 2 of 2:
==9416== Conditional jump or move depends on uninitialised value(s)
==9416==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9416==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9416==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9416==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9416==    by 0x42D8E9: execcmd (exec.c:3378)
==9416==    by 0x428CA0: execpline2 (exec.c:1697)
==9416==    by 0x427FD2: execpline (exec.c:1484)
==9416==    by 0x42779A: execlist (exec.c:1275)
==9416==    by 0x42717C: execode (exec.c:1073)
==9416==    by 0x431299: runshfunc (exec.c:5040)
==9416==    by 0x430E76: doshfunc (exec.c:4920)
==9416==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9416== 
==9416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9418== Checked 4,853,208 bytes
==9418== 
--9420-- Caught __NR_exit; running __libc_freeres()
==9420== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9420-by-pythonnut-on-???
==9420== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9420-by-pythonnut-on-???
==9420== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9420-by-pythonnut-on-???
==9420== 
==9420== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9420== don't want to do, unless you know exactly what you're doing,
==9420== or are doing some strange experiment):
==9420==   /usr/lib/valgrind/../../bin/vgdb --pid=9420 ...command...
==9420== 
==9420== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9420==   /path/to/gdb ./zsh
==9420== and then give GDB the following command
==9420==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9420
==9420== --pid is optional if only one valgrind process is running
==9420== 
==9418== LEAK SUMMARY:
==9418==    definitely lost: 1,533 bytes in 8 blocks
==9418==    indirectly lost: 6,756 bytes in 7 blocks
==9418==      possibly lost: 0 bytes in 0 blocks
==9418==    still reachable: 3,140,772 bytes in 69,391 blocks
==9418==         suppressed: 0 bytes in 0 blocks
==9418== Rerun with --leak-check=full to see details of leaked memory
==9418== 
==9418== Use --track-origins=yes to see where uninitialised values come from
==9418== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9418== 
==9418== 1 errors in context 1 of 2:
==9418== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9418==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9418==    by 0x488CD0: stringsubst (subst.c:301)
==9418==    by 0x48801B: prefork (subst.c:77)
==9418==    by 0x42B318: execcmd (exec.c:2619)
==9418==    by 0x428CA0: execpline2 (exec.c:1697)
==9418==    by 0x427FD2: execpline (exec.c:1484)
==9418==    by 0x427756: execlist (exec.c:1267)
==9418==    by 0x42717C: execode (exec.c:1073)
==9418==    by 0x431299: runshfunc (exec.c:5040)
==9418==    by 0x430E76: doshfunc (exec.c:4920)
==9418==    by 0x4302FB: execshfunc (exec.c:4557)
==9418==    by 0x42D8C1: execcmd (exec.c:3373)
==9418== 
==9418== 
==9418== 2 errors in context 2 of 2:
==9418== Conditional jump or move depends on uninitialised value(s)
==9418==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9418==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9418==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9418==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9418==    by 0x42D8E9: execcmd (exec.c:3378)
==9418==    by 0x428CA0: execpline2 (exec.c:1697)
==9418==    by 0x427FD2: execpline (exec.c:1484)
==9418==    by 0x42779A: execlist (exec.c:1275)
==9418==    by 0x42717C: execode (exec.c:1073)
==9418==    by 0x431299: runshfunc (exec.c:5040)
==9418==    by 0x430E76: doshfunc (exec.c:4920)
==9418==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9418== 
==9418== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9419== Checked 4,806,440 bytes
==9419== 
--9420-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9417-- Caught __NR_exit; running __libc_freeres()
==9420== 
==9420== HEAP SUMMARY:
==9420==     in use at exit: 3,116,072 bytes in 68,914 blocks
==9420==   total heap usage: 935,555 allocs, 866,641 frees, 66,351,245 bytes allocated
==9420== 
==9419== LEAK SUMMARY:
==9419==    definitely lost: 1,533 bytes in 8 blocks
==9419==    indirectly lost: 6,756 bytes in 7 blocks
==9419==      possibly lost: 0 bytes in 0 blocks
==9419==    still reachable: 3,114,554 bytes in 69,127 blocks
==9419==         suppressed: 0 bytes in 0 blocks
==9419== Rerun with --leak-check=full to see details of leaked memory
==9419== 
==9419== Use --track-origins=yes to see where uninitialised values come from
==9419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9419== 
==9419== 1 errors in context 1 of 2:
==9419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9419==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9419==    by 0x488CD0: stringsubst (subst.c:301)
==9419==    by 0x48801B: prefork (subst.c:77)
==9419==    by 0x42B318: execcmd (exec.c:2619)
==9419==    by 0x428CA0: execpline2 (exec.c:1697)
==9419==    by 0x427FD2: execpline (exec.c:1484)
==9419==    by 0x427756: execlist (exec.c:1267)
==9419==    by 0x42717C: execode (exec.c:1073)
==9419==    by 0x431299: runshfunc (exec.c:5040)
==9419==    by 0x430E76: doshfunc (exec.c:4920)
==9419==    by 0x4302FB: execshfunc (exec.c:4557)
==9419==    by 0x42D8C1: execcmd (exec.c:3373)
==9419== 
==9419== 
==9419== 2 errors in context 2 of 2:
==9419== Conditional jump or move depends on uninitialised value(s)
==9419==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9419==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9419==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9419==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9419==    by 0x42D8E9: execcmd (exec.c:3378)
==9419==    by 0x428CA0: execpline2 (exec.c:1697)
==9419==    by 0x427FD2: execpline (exec.c:1484)
==9419==    by 0x42779A: execlist (exec.c:1275)
==9419==    by 0x42717C: execode (exec.c:1073)
==9419==    by 0x431299: runshfunc (exec.c:5040)
==9419==    by 0x430E76: doshfunc (exec.c:4920)
==9419==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9419== 
==9419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9396-- Caught __NR_exit; running __libc_freeres()
--9417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9417== 
==9417== HEAP SUMMARY:
==9417==     in use at exit: 3,146,805 bytes in 69,326 blocks
==9417==   total heap usage: 939,183 allocs, 869,857 frees, 68,118,236 bytes allocated
==9417== 
==9420== Searching for pointers to 68,914 not-freed blocks
--9420--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9420--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9420--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9420--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9420--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9420--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9420--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9420--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9420--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9420--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9420--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9420--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9420--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9420--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9420--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9420--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9420--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9420--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9420--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9420--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9420--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9420--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9420--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9420--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9420--   Scanning root segment: 0x701a000..0x701afff (4096)
--9420--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9420--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9420--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9420--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9420--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9420--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9420--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9420--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9420--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9396-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9396== 
==9396== HEAP SUMMARY:
==9396==     in use at exit: 3,120,733 bytes in 69,060 blocks
==9396==   total heap usage: 935,633 allocs, 866,573 frees, 66,352,818 bytes allocated
==9396== 
==9417== Searching for pointers to 69,326 not-freed blocks
--9417--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9417--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9417--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9417--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9417--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9417--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9417--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9417--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9417--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9417--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9417--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9417--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9417--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9417--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9417--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9417--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9417--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9417--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9417--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9417--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9417--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9417--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9417--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9417--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9417--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9417--   Scanning root segment: 0x701a000..0x701afff (4096)
--9417--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9417--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9417--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9417--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9417--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9417--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9417--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9417--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9417--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9396== Searching for pointers to 69,060 not-freed blocks
--9396--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9396--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9396--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9396--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9396--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9396--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9396--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9396--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9396--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9396--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9396--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9396--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9396--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9396--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9396--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9396--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9396--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9396--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9396--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9396--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9396--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9396--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9396--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9396--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9396--   Scanning root segment: 0x701a000..0x701afff (4096)
--9396--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9396--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9396--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9396--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9396--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9396--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9396--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9396--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9396--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9420== Checked 4,777,296 bytes
==9420== 
==9420== LEAK SUMMARY:
==9420==    definitely lost: 1,533 bytes in 8 blocks
==9420==    indirectly lost: 6,756 bytes in 7 blocks
==9420==      possibly lost: 0 bytes in 0 blocks
==9420==    still reachable: 3,107,783 bytes in 68,899 blocks
==9420==         suppressed: 0 bytes in 0 blocks
==9420== Rerun with --leak-check=full to see details of leaked memory
==9420== 
==9420== Use --track-origins=yes to see where uninitialised values come from
==9420== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9420== 
==9420== 1 errors in context 1 of 2:
==9420== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9420==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9420==    by 0x488CD0: stringsubst (subst.c:301)
==9420==    by 0x48801B: prefork (subst.c:77)
==9420==    by 0x42B318: execcmd (exec.c:2619)
==9420==    by 0x428CA0: execpline2 (exec.c:1697)
==9420==    by 0x427FD2: execpline (exec.c:1484)
==9420==    by 0x427756: execlist (exec.c:1267)
==9420==    by 0x42717C: execode (exec.c:1073)
==9420==    by 0x431299: runshfunc (exec.c:5040)
==9420==    by 0x430E76: doshfunc (exec.c:4920)
==9420==    by 0x4302FB: execshfunc (exec.c:4557)
==9420==    by 0x42D8C1: execcmd (exec.c:3373)
==9420== 
==9420== 
==9420== 2 errors in context 2 of 2:
==9420== Conditional jump or move depends on uninitialised value(s)
==9420==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9420==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9420==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9420==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9420==    by 0x42D8E9: execcmd (exec.c:3378)
==9420==    by 0x428CA0: execpline2 (exec.c:1697)
==9420==    by 0x427FD2: execpline (exec.c:1484)
==9420==    by 0x42779A: execlist (exec.c:1275)
==9420==    by 0x42717C: execode (exec.c:1073)
==9420==    by 0x431299: runshfunc (exec.c:5040)
==9420==    by 0x430E76: doshfunc (exec.c:4920)
==9420==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9420== 
==9420== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== Checked 4,849,264 bytes
==9417== 
==9396== Checked 4,785,376 bytes
==9396== 
==9423== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9423-by-pythonnut-on-???
==9423== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9423-by-pythonnut-on-???
==9423== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9423-by-pythonnut-on-???
==9423== 
==9423== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9423== don't want to do, unless you know exactly what you're doing,
==9423== or are doing some strange experiment):
==9423==   /usr/lib/valgrind/../../bin/vgdb --pid=9423 ...command...
==9423== 
==9423== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9423==   /path/to/gdb ./zsh
==9423== and then give GDB the following command
==9423==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9423
==9423== --pid is optional if only one valgrind process is running
==9423== 
==9417== LEAK SUMMARY:
==9417==    definitely lost: 1,533 bytes in 8 blocks
==9417==    indirectly lost: 6,756 bytes in 7 blocks
==9417==      possibly lost: 0 bytes in 0 blocks
==9417==    still reachable: 3,138,516 bytes in 69,311 blocks
==9417==         suppressed: 0 bytes in 0 blocks
==9417== Rerun with --leak-check=full to see details of leaked memory
==9417== 
==9417== Use --track-origins=yes to see where uninitialised values come from
==9417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== 
==9417== 1 errors in context 1 of 2:
==9417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9417==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9417==    by 0x488CD0: stringsubst (subst.c:301)
==9417==    by 0x48801B: prefork (subst.c:77)
==9417==    by 0x42B318: execcmd (exec.c:2619)
==9417==    by 0x428CA0: execpline2 (exec.c:1697)
==9417==    by 0x427FD2: execpline (exec.c:1484)
==9417==    by 0x427756: execlist (exec.c:1267)
==9417==    by 0x42717C: execode (exec.c:1073)
==9417==    by 0x431299: runshfunc (exec.c:5040)
==9417==    by 0x430E76: doshfunc (exec.c:4920)
==9417==    by 0x4302FB: execshfunc (exec.c:4557)
==9417==    by 0x42D8C1: execcmd (exec.c:3373)
==9417== 
==9417== 
==9417== 2 errors in context 2 of 2:
==9417== Conditional jump or move depends on uninitialised value(s)
==9417==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9417==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9417==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9417==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9417==    by 0x42D8E9: execcmd (exec.c:3378)
==9417==    by 0x428CA0: execpline2 (exec.c:1697)
==9417==    by 0x427FD2: execpline (exec.c:1484)
==9417==    by 0x42779A: execlist (exec.c:1275)
==9417==    by 0x42717C: execode (exec.c:1073)
==9417==    by 0x431299: runshfunc (exec.c:5040)
==9417==    by 0x430E76: doshfunc (exec.c:4920)
==9417==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9417== 
==9417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9396== LEAK SUMMARY:
==9396==    definitely lost: 1,533 bytes in 8 blocks
==9396==    indirectly lost: 6,756 bytes in 7 blocks
==9396==      possibly lost: 0 bytes in 0 blocks
==9396==    still reachable: 3,112,444 bytes in 69,045 blocks
==9396==         suppressed: 0 bytes in 0 blocks
==9396== Rerun with --leak-check=full to see details of leaked memory
==9396== 
==9396== Use --track-origins=yes to see where uninitialised values come from
==9396== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
==9396== 
==9396== 1 errors in context 1 of 2:
==9396== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9396==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9396==    by 0x488CD0: stringsubst (subst.c:301)
==9396==    by 0x48801B: prefork (subst.c:77)
==9396==    by 0x42B318: execcmd (exec.c:2619)
==9396==    by 0x428CA0: execpline2 (exec.c:1697)
==9396==    by 0x427FD2: execpline (exec.c:1484)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
==9396==    by 0x427756: execlist (exec.c:1267)
==9396==    by 0x42717C: execode (exec.c:1073)
==9396==    by 0x431299: runshfunc (exec.c:5040)
==9396==    by 0x430E76: doshfunc (exec.c:4920)
==9396==    by 0x4302FB: execshfunc (exec.c:4557)
==9396==    by 0x42D8C1: execcmd (exec.c:3373)
==9396== 
==9396== 
==9396== 2 errors in context 2 of 2:
==9396== Conditional jump or move depends on uninitialised value(s)
==9396==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9396==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9396==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9396==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9396==    by 0x42D8E9: execcmd (exec.c:3378)
==9396==    by 0x428CA0: execpline2 (exec.c:1697)
==9396==    by 0x427FD2: execpline (exec.c:1484)
==9396==    by 0x42779A: execlist (exec.c:1275)
==9396==    by 0x42717C: execode (exec.c:1073)
==9396==    by 0x431299: runshfunc (exec.c:5040)
==9396==    by 0x430E76: doshfunc (exec.c:4920)
==9396==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9396== 
==9396== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
--9423-- Caught __NR_exit; running __libc_freeres()
==9394== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9394-by-pythonnut-on-???
==9394== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9394-by-pythonnut-on-???
==9394== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9394-by-pythonnut-on-???
==9394== 
==9394== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9394== don't want to do, unless you know exactly what you're doing,
==9394== or are doing some strange experiment):
==9394==   /usr/lib/valgrind/../../bin/vgdb --pid=9394 ...command...
==9394== 
==9394== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9394==   /path/to/gdb ./zsh
==9394== and then give GDB the following command
==9394==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9394
==9394== --pid is optional if only one valgrind process is running
==9394== 
--9423-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFEC39C,  len 4
--9394-- Caught __NR_exit; running __libc_freeres()
==9423== 
==9423== HEAP SUMMARY:
==9423==     in use at exit: 3,116,113 bytes in 68,915 blocks
==9423==   total heap usage: 935,568 allocs, 866,653 frees, 66,353,945 bytes allocated
==9423== 
--9424-- Caught __NR_exit; running __libc_freeres()
==9424== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9424-by-pythonnut-on-???
==9424== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9424-by-pythonnut-on-???
==9424== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9424-by-pythonnut-on-???
==9424== 
==9424== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9424== don't want to do, unless you know exactly what you're doing,
==9424== or are doing some strange experiment):
==9424==   /usr/lib/valgrind/../../bin/vgdb --pid=9424 ...command...
==9424== 
==9424== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9424==   /path/to/gdb ./zsh
==9424== and then give GDB the following command
==9424==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9424
==9424== --pid is optional if only one valgrind process is running
==9424== 
--9394-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9394== 
==9423== Searching for pointers to 68,915 not-freed blocks
--9423--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9423--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9423--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9423--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9423--   Scanning root segment: 0x4222000..0x4222fff (4096)
==9394== HEAP SUMMARY:
==9394==     in use at exit: 3,118,684 bytes in 68,988 blocks
==9394==   total heap usage: 935,576 allocs, 866,588 frees, 66,358,057 bytes allocated
==9394== 
--9423--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9423--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9423--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9423--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9423--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9423--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9423--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9423--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9423--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9423--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9423--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9423--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9423--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9423--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9423--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9424-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9423--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9423--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9423--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9423--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9423--   Scanning root segment: 0x701a000..0x701afff (4096)
--9423--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9423--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9423--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9423--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9423--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9423--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9423--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9423--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9423--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9424== 
==9424== HEAP SUMMARY:
==9424==     in use at exit: 3,148,632 bytes in 69,317 blocks
==9424==   total heap usage: 939,296 allocs, 869,979 frees, 68,133,699 bytes allocated
==9424== 
==9394== Searching for pointers to 68,988 not-freed blocks
--9394--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9394--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9394--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9394--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9394--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9394--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9394--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9394--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9394--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9394--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9394--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9394--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9394--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9394--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9394--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9394--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9394--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9394--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9394--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9394--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9394--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9394--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9394--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9394--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9394--   Scanning root segment: 0x701a000..0x701afff (4096)
--9394--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9394--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9394--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9394--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9394--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9394--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9394--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9394--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9394--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9424== Searching for pointers to 69,317 not-freed blocks
--9424--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9424--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9424--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9424--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9424--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9424--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9424--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9424--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9424--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9424--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9424--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9424--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9424--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9424--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9424--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9424--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9424--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9424--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9424--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9424--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9424--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9424--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9424--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9424--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9424--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9424--   Scanning root segment: 0x701a000..0x701afff (4096)
--9424--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9424--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9424--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9424--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9424--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9424--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9424--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9424--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9424--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9423== Checked 4,776,824 bytes
==9423== 
==9423== LEAK SUMMARY:
==9423==    definitely lost: 1,533 bytes in 8 blocks
==9423==    indirectly lost: 6,756 bytes in 7 blocks
==9423==      possibly lost: 0 bytes in 0 blocks
==9423==    still reachable: 3,107,824 bytes in 68,900 blocks
==9423==         suppressed: 0 bytes in 0 blocks
==9423== Rerun with --leak-check=full to see details of leaked memory
==9423== 
==9423== Use --track-origins=yes to see where uninitialised values come from
==9423== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9423== 
==9423== 1 errors in context 1 of 2:
==9423== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9423==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9423==    by 0x488CD0: stringsubst (subst.c:301)
==9423==    by 0x48801B: prefork (subst.c:77)
==9423==    by 0x42B318: execcmd (exec.c:2619)
==9423==    by 0x428CA0: execpline2 (exec.c:1697)
==9423==    by 0x427FD2: execpline (exec.c:1484)
==9423==    by 0x427756: execlist (exec.c:1267)
==9423==    by 0x42717C: execode (exec.c:1073)
==9423==    by 0x431299: runshfunc (exec.c:5040)
==9423==    by 0x430E76: doshfunc (exec.c:4920)
==9423==    by 0x4302FB: execshfunc (exec.c:4557)
==9423==    by 0x42D8C1: execcmd (exec.c:3373)
==9423== 
==9423== 
==9423== 2 errors in context 2 of 2:
==9423== Conditional jump or move depends on uninitialised value(s)
==9423==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9423==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9423==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9423==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9423==    by 0x42D8E9: execcmd (exec.c:3378)
==9423==    by 0x428CA0: execpline2 (exec.c:1697)
==9423==    by 0x427FD2: execpline (exec.c:1484)
==9423==    by 0x42779A: execlist (exec.c:1275)
==9423==    by 0x42717C: execode (exec.c:1073)
==9423==    by 0x431299: runshfunc (exec.c:5040)
==9423==    by 0x430E76: doshfunc (exec.c:4920)
==9423==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9423== 
==9423== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9394== Checked 4,782,328 bytes
==9394== 
==9424== Checked 4,849,496 bytes
==9424== 
==9426== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9426-by-pythonnut-on-???
==9426== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9426-by-pythonnut-on-???
==9426== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9426-by-pythonnut-on-???
==9426== 
==9426== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9426== don't want to do, unless you know exactly what you're doing,
==9426== or are doing some strange experiment):
==9426==   /usr/lib/valgrind/../../bin/vgdb --pid=9426 ...command...
==9426== 
==9426== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9426==   /path/to/gdb ./zsh
==9426== and then give GDB the following command
==9426==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9426
==9426== --pid is optional if only one valgrind process is running
==9426== 
--9426-- Caught __NR_exit; running __libc_freeres()
==9394== LEAK SUMMARY:
==9394==    definitely lost: 1,533 bytes in 8 blocks
==9394==    indirectly lost: 6,756 bytes in 7 blocks
==9394==      possibly lost: 0 bytes in 0 blocks
==9394==    still reachable: 3,110,395 bytes in 68,973 blocks
==9394==         suppressed: 0 bytes in 0 blocks
==9394== Rerun with --leak-check=full to see details of leaked memory
==9394== 
==9394== Use --track-origins=yes to see where uninitialised values come from
==9394== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9394== 
==9394== 1 errors in context 1 of 2:
==9394== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9394==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9394==    by 0x488CD0: stringsubst (subst.c:301)
==9394==    by 0x48801B: prefork (subst.c:77)
==9394==    by 0x42B318: execcmd (exec.c:2619)
==9394==    by 0x428CA0: execpline2 (exec.c:1697)
==9394==    by 0x427FD2: execpline (exec.c:1484)
==9394==    by 0x427756: execlist (exec.c:1267)
==9394==    by 0x42717C: execode (exec.c:1073)
==9394==    by 0x431299: runshfunc (exec.c:5040)
==9394==    by 0x430E76: doshfunc (exec.c:4920)
==9394==    by 0x4302FB: execshfunc (exec.c:4557)
==9394==    by 0x42D8C1: execcmd (exec.c:3373)
==9394== 
==9394== 
==9394== 2 errors in context 2 of 2:
==9394== Conditional jump or move depends on uninitialised value(s)
==9394==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9394==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9394==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9394==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9394==    by 0x42D8E9: execcmd (exec.c:3378)
==9394==    by 0x428CA0: execpline2 (exec.c:1697)
==9394==    by 0x427FD2: execpline (exec.c:1484)
==9394==    by 0x42779A: execlist (exec.c:1275)
==9394==    by 0x42717C: execode (exec.c:1073)
==9394==    by 0x431299: runshfunc (exec.c:5040)
==9394==    by 0x430E76: doshfunc (exec.c:4920)
==9394==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9394== 
==9394== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9424== LEAK SUMMARY:
==9424==    definitely lost: 1,533 bytes in 8 blocks
==9424==    indirectly lost: 6,756 bytes in 7 blocks
==9424==      possibly lost: 0 bytes in 0 blocks
==9424==    still reachable: 3,140,343 bytes in 69,302 blocks
==9424==         suppressed: 0 bytes in 0 blocks
==9424== Rerun with --leak-check=full to see details of leaked memory
==9424== 
==9424== Use --track-origins=yes to see where uninitialised values come from
==9424== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9424== 
==9424== 1 errors in context 1 of 2:
==9424== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9424==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9424==    by 0x488CD0: stringsubst (subst.c:301)
==9424==    by 0x48801B: prefork (subst.c:77)
==9424==    by 0x42B318: execcmd (exec.c:2619)
==9424==    by 0x428CA0: execpline2 (exec.c:1697)
==9424==    by 0x427FD2: execpline (exec.c:1484)
==9424==    by 0x427756: execlist (exec.c:1267)
==9424==    by 0x42717C: execode (exec.c:1073)
==9424==    by 0x431299: runshfunc (exec.c:5040)
==9424==    by 0x430E76: doshfunc (exec.c:4920)
==9424==    by 0x4302FB: execshfunc (exec.c:4557)
==9424==    by 0x42D8C1: execcmd (exec.c:3373)
==9424== 
==9424== 
==9424== 2 errors in context 2 of 2:
==9424== Conditional jump or move depends on uninitialised value(s)
==9424==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9424==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9424==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9424==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9424==    by 0x42D8E9: execcmd (exec.c:3378)
==9424==    by 0x428CA0: execpline2 (exec.c:1697)
==9424==    by 0x427FD2: execpline (exec.c:1484)
==9424==    by 0x42779A: execlist (exec.c:1275)
==9424==    by 0x42717C: execode (exec.c:1073)
==9424==    by 0x431299: runshfunc (exec.c:5040)
==9424==    by 0x430E76: doshfunc (exec.c:4920)
==9424==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9424== 
==9424== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9427== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9427-by-pythonnut-on-???
==9427== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9427-by-pythonnut-on-???
==9427== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9427-by-pythonnut-on-???
==9427== 
==9427== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9427== don't want to do, unless you know exactly what you're doing,
==9427== or are doing some strange experiment):
==9427==   /usr/lib/valgrind/../../bin/vgdb --pid=9427 ...command...
==9427== 
==9427== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9427==   /path/to/gdb ./zsh
==9427== and then give GDB the following command
==9427==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9427
==9427== --pid is optional if only one valgrind process is running
==9427== 
--9426-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9426== 
==9428== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9428-by-pythonnut-on-???
==9428== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9428-by-pythonnut-on-???
==9428== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9428-by-pythonnut-on-???
==9428== 
==9428== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9428== don't want to do, unless you know exactly what you're doing,
==9428== or are doing some strange experiment):
==9428==   /usr/lib/valgrind/../../bin/vgdb --pid=9428 ...command...
==9428== 
==9428== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9428==   /path/to/gdb ./zsh
==9428== and then give GDB the following command
==9428==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9428
==9428== --pid is optional if only one valgrind process is running
==9428== 
--9429-- Caught __NR_exit; running __libc_freeres()
--9428-- Caught __NR_exit; running __libc_freeres()
==9426== HEAP SUMMARY:
==9426==     in use at exit: 3,114,632 bytes in 68,855 blocks
==9426==   total heap usage: 935,538 allocs, 866,683 frees, 66,356,946 bytes allocated
==9426== 
==9429== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9429-by-pythonnut-on-???
==9429== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9429-by-pythonnut-on-???
==9429== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9429-by-pythonnut-on-???
==9429== 
==9429== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9429== don't want to do, unless you know exactly what you're doing,
==9429== or are doing some strange experiment):
==9429==   /usr/lib/valgrind/../../bin/vgdb --pid=9429 ...command...
==9429== 
==9429== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9429==   /path/to/gdb ./zsh
==9429== and then give GDB the following command
==9429==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9429
==9429== --pid is optional if only one valgrind process is running
==9429== 
--9428-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9426== Searching for pointers to 68,855 not-freed blocks
--9426--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9426--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9426--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9426--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9426--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9426--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9426--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9426--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9426--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9426--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9426--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9426--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9426--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9426--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9426--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9426--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9426--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9426--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9426--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9426--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9426--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9426--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9426--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9426--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9426--   Scanning root segment: 0x701a000..0x701afff (4096)
--9426--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9426--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9426--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9426--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9426--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9426--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9426--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9426--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9429-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9426--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9428== 
==9428== HEAP SUMMARY:
==9428==     in use at exit: 3,147,816 bytes in 69,273 blocks
==9428==   total heap usage: 939,253 allocs, 869,980 frees, 68,133,181 bytes allocated
==9428== 
==9429== 
==9429== HEAP SUMMARY:
==9429==     in use at exit: 3,120,437 bytes in 69,055 blocks
==9429==   total heap usage: 935,488 allocs, 866,433 frees, 66,327,215 bytes allocated
==9429== 
==9428== Searching for pointers to 69,273 not-freed blocks
--9428--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9428--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9428--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9428--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9428--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9428--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9428--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9428--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9428--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9428--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9428--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9428--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9428--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9428--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9428--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9428--   Scanning root segment: 0x59ba000..0x59bafff (4096)
==9429== Searching for pointers to 69,055 not-freed blocks
--9428--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9429--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9428--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9428--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9429--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9428--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9428--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9429--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9429--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9429--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9428--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9429--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9429--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9428--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9429--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9429--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9428--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9429--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9429--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9429--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9428--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9429--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9429--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9428--   Scanning root segment: 0x701a000..0x701afff (4096)
--9429--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9429--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9428--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9429--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9428--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9428--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9429--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9429--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9428--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9429--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9428--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9428--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9428--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9428--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9428--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9429--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9429--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9429--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9429--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9429--   Scanning root segment: 0x701a000..0x701afff (4096)
--9429--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9429--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9429--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9429--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9429--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9429--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9429--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9429--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9429--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9426== Checked 4,776,280 bytes
==9426== 
==9426== LEAK SUMMARY:
==9426==    definitely lost: 1,533 bytes in 8 blocks
==9426==    indirectly lost: 6,756 bytes in 7 blocks
==9426==      possibly lost: 0 bytes in 0 blocks
==9426==    still reachable: 3,106,343 bytes in 68,840 blocks
==9426==         suppressed: 0 bytes in 0 blocks
==9426== Rerun with --leak-check=full to see details of leaked memory
==9426== 
==9426== Use --track-origins=yes to see where uninitialised values come from
==9426== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9426== 
==9426== 1 errors in context 1 of 2:
==9426== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9426==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9426==    by 0x488CD0: stringsubst (subst.c:301)
==9426==    by 0x48801B: prefork (subst.c:77)
==9426==    by 0x42B318: execcmd (exec.c:2619)
==9426==    by 0x428CA0: execpline2 (exec.c:1697)
==9426==    by 0x427FD2: execpline (exec.c:1484)
==9426==    by 0x427756: execlist (exec.c:1267)
==9426==    by 0x42717C: execode (exec.c:1073)
==9426==    by 0x431299: runshfunc (exec.c:5040)
==9426==    by 0x430E76: doshfunc (exec.c:4920)
==9426==    by 0x4302FB: execshfunc (exec.c:4557)
==9426==    by 0x42D8C1: execcmd (exec.c:3373)
==9426== 
==9426== 
==9426== 2 errors in context 2 of 2:
==9426== Conditional jump or move depends on uninitialised value(s)
==9426==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9426==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9426==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9426==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9426==    by 0x42D8E9: execcmd (exec.c:3378)
==9426==    by 0x428CA0: execpline2 (exec.c:1697)
==9426==    by 0x427FD2: execpline (exec.c:1484)
==9426==    by 0x42779A: execlist (exec.c:1275)
==9426==    by 0x42717C: execode (exec.c:1073)
==9426==    by 0x431299: runshfunc (exec.c:5040)
==9426==    by 0x430E76: doshfunc (exec.c:4920)
==9426==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9426== 
==9426== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429== Checked 4,785,704 bytes
==9429== 
==9428== Checked 4,848,176 bytes
==9428== 
==9428== LEAK SUMMARY:
==9429== LEAK SUMMARY:
==9428==    definitely lost: 1,533 bytes in 8 blocks
==9429==    definitely lost: 1,533 bytes in 8 blocks
==9428==    indirectly lost: 6,756 bytes in 7 blocks
==9429==    indirectly lost: 6,756 bytes in 7 blocks
==9428==      possibly lost: 0 bytes in 0 blocks
==9429==      possibly lost: 0 bytes in 0 blocks
==9428==    still reachable: 3,139,527 bytes in 69,258 blocks
==9429==    still reachable: 3,112,148 bytes in 69,040 blocks
==9428==         suppressed: 0 bytes in 0 blocks
==9429==         suppressed: 0 bytes in 0 blocks
==9428== Rerun with --leak-check=full to see details of leaked memory
==9429== Rerun with --leak-check=full to see details of leaked memory
==9428== 
==9429== 
==9428== Use --track-origins=yes to see where uninitialised values come from
==9428== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9428== 
==9428== 1 errors in context 1 of 2:
==9428== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9429== Use --track-origins=yes to see where uninitialised values come from
==9428==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9429== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429== 
==9429== 1 errors in context 1 of 2:
==9428==    by 0x488CD0: stringsubst (subst.c:301)
==9429== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9428==    by 0x48801B: prefork (subst.c:77)
==9428==    by 0x42B318: execcmd (exec.c:2619)
==9429==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9428==    by 0x428CA0: execpline2 (exec.c:1697)
==9428==    by 0x427FD2: execpline (exec.c:1484)
==9428==    by 0x427756: execlist (exec.c:1267)
==9429==    by 0x488CD0: stringsubst (subst.c:301)
==9428==    by 0x42717C: execode (exec.c:1073)
==9429==    by 0x48801B: prefork (subst.c:77)
==9428==    by 0x431299: runshfunc (exec.c:5040)
==9428==    by 0x430E76: doshfunc (exec.c:4920)
==9429==    by 0x42B318: execcmd (exec.c:2619)
==9428==    by 0x4302FB: execshfunc (exec.c:4557)
==9429==    by 0x428CA0: execpline2 (exec.c:1697)
==9428==    by 0x42D8C1: execcmd (exec.c:3373)
==9428== 
==9429==    by 0x427FD2: execpline (exec.c:1484)
==9429==    by 0x427756: execlist (exec.c:1267)
==9428== 
==9429==    by 0x42717C: execode (exec.c:1073)
==9428== 2 errors in context 2 of 2:
==9429==    by 0x431299: runshfunc (exec.c:5040)
==9428== Conditional jump or move depends on uninitialised value(s)
==9429==    by 0x430E76: doshfunc (exec.c:4920)
==9428==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9429==    by 0x4302FB: execshfunc (exec.c:4557)
==9428==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9429==    by 0x42D8C1: execcmd (exec.c:3373)
==9428==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9429== 
==9428==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9429== 
==9428==    by 0x42D8E9: execcmd (exec.c:3378)
==9429== 2 errors in context 2 of 2:
==9428==    by 0x428CA0: execpline2 (exec.c:1697)
==9429== Conditional jump or move depends on uninitialised value(s)
==9428==    by 0x427FD2: execpline (exec.c:1484)
==9428==    by 0x42779A: execlist (exec.c:1275)
==9428==    by 0x42717C: execode (exec.c:1073)
==9429==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9428==    by 0x431299: runshfunc (exec.c:5040)
==9428==    by 0x430E76: doshfunc (exec.c:4920)
==9429==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9428==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9429==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9428== 
==9429==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9428== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429==    by 0x42D8E9: execcmd (exec.c:3378)
==9429==    by 0x428CA0: execpline2 (exec.c:1697)
==9429==    by 0x427FD2: execpline (exec.c:1484)
==9429==    by 0x42779A: execlist (exec.c:1275)
==9429==    by 0x42717C: execode (exec.c:1073)
==9429==    by 0x431299: runshfunc (exec.c:5040)
==9429==    by 0x430E76: doshfunc (exec.c:4920)
==9429==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9429== 
==9429== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9431-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9431== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9431-by-pythonnut-on-???
==9431== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9431-by-pythonnut-on-???
==9431== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9431-by-pythonnut-on-???
==9431== 
==9431== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9431== don't want to do, unless you know exactly what you're doing,
==9431== or are doing some strange experiment):
==9431==   /usr/lib/valgrind/../../bin/vgdb --pid=9431 ...command...
==9431== 
==9431== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9431==   /path/to/gdb ./zsh
==9431== and then give GDB the following command
==9431==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9431
==9431== --pid is optional if only one valgrind process is running
==9431== 
==9434== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9434-by-pythonnut-on-???
==9434== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9434-by-pythonnut-on-???
==9434== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9434-by-pythonnut-on-???
==9434== 
==9434== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9434== don't want to do, unless you know exactly what you're doing,
==9434== or are doing some strange experiment):
==9434==   /usr/lib/valgrind/../../bin/vgdb --pid=9434 ...command...
==9434== 
==9434== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9434==   /path/to/gdb ./zsh
==9434== and then give GDB the following command
==9434==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9434
==9434== --pid is optional if only one valgrind process is running
==9434== 
client request: code 4d430005,  addr 0xFFEFECF3C,  len 4
--9431-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9435== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9435-by-pythonnut-on-???
==9435== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9435-by-pythonnut-on-???
==9435== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9435-by-pythonnut-on-???
==9435== 
==9435== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9435== don't want to do, unless you know exactly what you're doing,
==9435== or are doing some strange experiment):
==9435==   /usr/lib/valgrind/../../bin/vgdb --pid=9435 ...command...
==9435== 
==9435== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9435==   /path/to/gdb ./zsh
==9435== and then give GDB the following command
==9435==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9435
==9435== --pid is optional if only one valgrind process is running
==9435== 
==9431== 
==9436== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9436-by-pythonnut-on-???
==9436== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9436-by-pythonnut-on-???
==9436== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9436-by-pythonnut-on-???
==9436== 
==9436== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9436== don't want to do, unless you know exactly what you're doing,
==9436== or are doing some strange experiment):
==9436==   /usr/lib/valgrind/../../bin/vgdb --pid=9436 ...command...
==9436== 
==9436== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9436==   /path/to/gdb ./zsh
==9436== and then give GDB the following command
==9436==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9436
==9436== --pid is optional if only one valgrind process is running
==9436== 
==9431== HEAP SUMMARY:
==9431==     in use at exit: 3,126,864 bytes in 69,095 blocks
==9431==   total heap usage: 935,895 allocs, 866,800 frees, 66,383,889 bytes allocated
==9431== 
==9438== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9438-by-pythonnut-on-???
==9438== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9438-by-pythonnut-on-???
==9438== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9438-by-pythonnut-on-???
==9438== 
==9438== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9438== don't want to do, unless you know exactly what you're doing,
==9438== or are doing some strange experiment):
==9438==   /usr/lib/valgrind/../../bin/vgdb --pid=9438 ...command...
==9438== 
==9438== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9438==   /path/to/gdb ./zsh
==9438== and then give GDB the following command
==9438==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9438
==9438== --pid is optional if only one valgrind process is running
==9438== 
client request: code 4d430005,  addr 0xFFEFECD7C,  len 4
--9436-- Caught __NR_exit; running __libc_freeres()
==9431== Searching for pointers to 69,095 not-freed blocks
--9431--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9431--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9431--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9431--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9431--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9431--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9431--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9431--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9431--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9431--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9431--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9431--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9431--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9431--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9431--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9431--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9431--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9431--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9431--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9431--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9439== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9439-by-pythonnut-on-???
==9439== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9439-by-pythonnut-on-???
==9439== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9439-by-pythonnut-on-???
==9439== 
==9439== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9439== don't want to do, unless you know exactly what you're doing,
==9439== or are doing some strange experiment):
==9439==   /usr/lib/valgrind/../../bin/vgdb --pid=9439 ...command...
==9439== 
==9439== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9439==   /path/to/gdb ./zsh
==9439== and then give GDB the following command
==9439==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9439
==9439== --pid is optional if only one valgrind process is running
==9439== 
--9431--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9431--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9431--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9431--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9431--   Scanning root segment: 0x701a000..0x701afff (4096)
--9431--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9431--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9431--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9431--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9431--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9431--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9431--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9431--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9431--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
--9439-- Caught __NR_exit; running __libc_freeres()
--9436-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9436== 
==9436== HEAP SUMMARY:
==9436==     in use at exit: 3,123,411 bytes in 69,121 blocks
==9436==   total heap usage: 935,623 allocs, 866,502 frees, 66,585,121 bytes allocated
==9436== 
--9439-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9439== 
==9439== HEAP SUMMARY:
==9439==     in use at exit: 3,155,620 bytes in 69,497 blocks
==9439==   total heap usage: 940,029 allocs, 870,532 frees, 68,419,357 bytes allocated
==9439== 
==9436== Searching for pointers to 69,121 not-freed blocks
--9436--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9436--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9436--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9436--   Scanning root segment: 0x4037000..0x403afff (16384)
--9436--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9436--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9436--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9436--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9436--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9436--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9436--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9436--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9436--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9436--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9436--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9436--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9436--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9436--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9436--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9436--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9436--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9436--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9436--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9436--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9436--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9436--   Scanning root segment: 0x701a000..0x701afff (4096)
--9436--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9436--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9436--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9436--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9436--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9436--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9436--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9436--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9436--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9439== Searching for pointers to 69,497 not-freed blocks
--9439--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9439--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9439--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9439--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9439--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9439--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9439--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9439--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9439--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9439--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9439--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9439--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9439--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9439--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9439--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9439--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9439--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9439--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9439--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9439--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9439--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9439--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9439--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9439--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9439--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9439--   Scanning root segment: 0x701a000..0x701afff (4096)
--9439--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9439--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9439--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9439--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9439--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9439--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9439--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9439--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9439--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9431== Checked 4,795,624 bytes
==9431== 
==9431== LEAK SUMMARY:
==9431==    definitely lost: 1,533 bytes in 8 blocks
==9431==    indirectly lost: 6,756 bytes in 7 blocks
==9431==      possibly lost: 0 bytes in 0 blocks
==9431==    still reachable: 3,118,575 bytes in 69,080 blocks
==9431==         suppressed: 0 bytes in 0 blocks
==9431== Rerun with --leak-check=full to see details of leaked memory
==9431== 
==9431== Use --track-origins=yes to see where uninitialised values come from
==9431== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9431== 
==9431== 1 errors in context 1 of 2:
==9431== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9431==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9431==    by 0x488CD0: stringsubst (subst.c:301)
==9431==    by 0x48801B: prefork (subst.c:77)
==9431==    by 0x42B318: execcmd (exec.c:2619)
==9431==    by 0x428CA0: execpline2 (exec.c:1697)
==9431==    by 0x427FD2: execpline (exec.c:1484)
==9431==    by 0x427756: execlist (exec.c:1267)
==9431==    by 0x42717C: execode (exec.c:1073)
==9431==    by 0x431299: runshfunc (exec.c:5040)
==9431==    by 0x430E76: doshfunc (exec.c:4920)
==9431==    by 0x4302FB: execshfunc (exec.c:4557)
==9431==    by 0x42D8C1: execcmd (exec.c:3373)
==9431== 
==9431== 
==9431== 2 errors in context 2 of 2:
==9431== Conditional jump or move depends on uninitialised value(s)
==9431==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9431==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9431==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9431==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9431==    by 0x42D8E9: execcmd (exec.c:3378)
==9431==    by 0x428CA0: execpline2 (exec.c:1697)
==9431==    by 0x427FD2: execpline (exec.c:1484)
==9431==    by 0x42779A: execlist (exec.c:1275)
==9431==    by 0x42717C: execode (exec.c:1073)
==9431==    by 0x431299: runshfunc (exec.c:5040)
==9431==    by 0x430E76: doshfunc (exec.c:4920)
==9431==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9431== 
==9431== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9430-- Caught __NR_exit; running __libc_freeres()
==9430== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9430-by-pythonnut-on-???
==9430== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9430-by-pythonnut-on-???
==9430== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9430-by-pythonnut-on-???
==9430== 
==9430== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9430== don't want to do, unless you know exactly what you're doing,
==9430== or are doing some strange experiment):
==9430==   /usr/lib/valgrind/../../bin/vgdb --pid=9430 ...command...
==9430== 
==9430== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9430==   /path/to/gdb ./zsh
==9430== and then give GDB the following command
==9430==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9430
==9430== --pid is optional if only one valgrind process is running
==9430== 
--9430-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9430== 
==9430== HEAP SUMMARY:
==9430==     in use at exit: 3,126,800 bytes in 69,092 blocks
==9430==   total heap usage: 935,893 allocs, 866,801 frees, 66,383,648 bytes allocated
==9430== 
==9436== Checked 4,788,224 bytes
==9436== 
==9439== Checked 4,873,248 bytes
==9439== 
==9436== LEAK SUMMARY:
==9436==    definitely lost: 1,533 bytes in 8 blocks
==9436==    indirectly lost: 6,756 bytes in 7 blocks
==9436==      possibly lost: 0 bytes in 0 blocks
==9436==    still reachable: 3,115,122 bytes in 69,106 blocks
==9436==         suppressed: 0 bytes in 0 blocks
==9436== Rerun with --leak-check=full to see details of leaked memory
==9436== 
==9436== Use --track-origins=yes to see where uninitialised values come from
==9436== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9436== 
==9436== 1 errors in context 1 of 2:
==9436== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9436==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9436==    by 0x488CD0: stringsubst (subst.c:301)
==9436==    by 0x48801B: prefork (subst.c:77)
==9436==    by 0x42B318: execcmd (exec.c:2619)
==9436==    by 0x428CA0: execpline2 (exec.c:1697)
==9436==    by 0x427FD2: execpline (exec.c:1484)
==9436==    by 0x427756: execlist (exec.c:1267)
==9436==    by 0x42717C: execode (exec.c:1073)
==9436==    by 0x431299: runshfunc (exec.c:5040)
==9436==    by 0x430E76: doshfunc (exec.c:4920)
==9436==    by 0x4302FB: execshfunc (exec.c:4557)
==9436==    by 0x42D8C1: execcmd (exec.c:3373)
==9436== 
==9436== 
==9436== 2 errors in context 2 of 2:
==9436== Conditional jump or move depends on uninitialised value(s)
==9436==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9436==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9436==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9436==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9436==    by 0x42D8E9: execcmd (exec.c:3378)
==9436==    by 0x428CA0: execpline2 (exec.c:1697)
==9436==    by 0x427FD2: execpline (exec.c:1484)
==9436==    by 0x42779A: execlist (exec.c:1275)
==9436==    by 0x42717C: execode (exec.c:1073)
==9436==    by 0x431299: runshfunc (exec.c:5040)
==9436==    by 0x430E76: doshfunc (exec.c:4920)
==9436==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9436== 
==9436== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9430== Searching for pointers to 69,092 not-freed blocks
--9430--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9430--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9430--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9430--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9430--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9430--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9430--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9430--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9430--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9430--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9430--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9430--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9430--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9430--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9430--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9430--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9430--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9430--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9430--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9430--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9430--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9430--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9430--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9430--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9430--   Scanning root segment: 0x701a000..0x701afff (4096)
--9430--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9430--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9430--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9430--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9430--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9430--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9430--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9430--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9430--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9439== LEAK SUMMARY:
==9439==    definitely lost: 1,533 bytes in 8 blocks
==9439==    indirectly lost: 6,756 bytes in 7 blocks
==9439==      possibly lost: 0 bytes in 0 blocks
==9439==    still reachable: 3,147,331 bytes in 69,482 blocks
==9439==         suppressed: 0 bytes in 0 blocks
==9439== Rerun with --leak-check=full to see details of leaked memory
==9439== 
==9439== Use --track-origins=yes to see where uninitialised values come from
==9439== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9439== 
==9439== 1 errors in context 1 of 2:
==9439== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9439==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9439==    by 0x488CD0: stringsubst (subst.c:301)
==9439==    by 0x48801B: prefork (subst.c:77)
==9439==    by 0x42B318: execcmd (exec.c:2619)
==9439==    by 0x428CA0: execpline2 (exec.c:1697)
==9439==    by 0x427FD2: execpline (exec.c:1484)
==9439==    by 0x427756: execlist (exec.c:1267)
==9439==    by 0x42717C: execode (exec.c:1073)
==9439==    by 0x431299: runshfunc (exec.c:5040)
==9439==    by 0x430E76: doshfunc (exec.c:4920)
==9439==    by 0x4302FB: execshfunc (exec.c:4557)
==9439==    by 0x42D8C1: execcmd (exec.c:3373)
==9439== 
==9439== 
==9439== 2 errors in context 2 of 2:
==9439== Conditional jump or move depends on uninitialised value(s)
==9439==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9439==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9439==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9439==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9439==    by 0x42D8E9: execcmd (exec.c:3378)
==9439==    by 0x428CA0: execpline2 (exec.c:1697)
==9439==    by 0x427FD2: execpline (exec.c:1484)
==9439==    by 0x42779A: execlist (exec.c:1275)
==9439==    by 0x42717C: execode (exec.c:1073)
==9439==    by 0x431299: runshfunc (exec.c:5040)
==9439==    by 0x430E76: doshfunc (exec.c:4920)
==9439==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9439== 
==9439== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9438-- Caught __NR_exit; running __libc_freeres()
==9440== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9440-by-pythonnut-on-???
==9440== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9440-by-pythonnut-on-???
==9440== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9440-by-pythonnut-on-???
==9440== 
==9440== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9440== don't want to do, unless you know exactly what you're doing,
==9440== or are doing some strange experiment):
==9440==   /usr/lib/valgrind/../../bin/vgdb --pid=9440 ...command...
==9440== 
==9440== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9440==   /path/to/gdb ./zsh
==9440== and then give GDB the following command
==9440==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9440
==9440== --pid is optional if only one valgrind process is running
==9440== 
==9441== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9441-by-pythonnut-on-???
==9441== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9441-by-pythonnut-on-???
==9441== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9441-by-pythonnut-on-???
==9441== 
==9441== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9441== don't want to do, unless you know exactly what you're doing,
==9441== or are doing some strange experiment):
==9441==   /usr/lib/valgrind/../../bin/vgdb --pid=9441 ...command...
==9441== 
==9441== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9441==   /path/to/gdb ./zsh
==9441== and then give GDB the following command
==9441==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9441
==9441== --pid is optional if only one valgrind process is running
==9441== 
--9441-- Caught __NR_exit; running __libc_freeres()
--9438-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9438== 
==9438== HEAP SUMMARY:
==9438==     in use at exit: 3,153,268 bytes in 69,417 blocks
==9438==   total heap usage: 939,935 allocs, 870,518 frees, 68,220,162 bytes allocated
==9438== 
--9441-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9441== 
==9441== HEAP SUMMARY:
==9441==     in use at exit: 3,196,790 bytes in 69,128 blocks
==9441==   total heap usage: 935,631 allocs, 866,503 frees, 66,661,652 bytes allocated
==9441== 
==9438== Searching for pointers to 69,417 not-freed blocks
--9438--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9438--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9438--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9438--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9438--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9438--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9438--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9438--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9438--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9438--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9438--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9438--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9438--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9438--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9438--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9438--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9438--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9438--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9438--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9438--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9438--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9438--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9438--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9438--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9438--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9438--   Scanning root segment: 0x701a000..0x701afff (4096)
--9438--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9438--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9438--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9438--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9438--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9438--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9438--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9438--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9438--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9430== Checked 4,794,936 bytes
==9430== 
==9441== Searching for pointers to 69,128 not-freed blocks
--9441--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9441--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9441--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9441--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9441--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9441--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9441--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9441--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9441--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9441--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9441--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9441--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9441--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9441--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9441--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9441--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9441--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9441--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9441--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9441--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9441--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9441--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9441--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9441--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9441--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9441--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9441--   Scanning root segment: 0x701a000..0x701afff (4096)
--9441--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9441--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9441--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9441--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9441--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9441--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9441--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9441--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9441--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9430== LEAK SUMMARY:
==9430==    definitely lost: 1,533 bytes in 8 blocks
==9430==    indirectly lost: 6,756 bytes in 7 blocks
==9430==      possibly lost: 0 bytes in 0 blocks
==9430==    still reachable: 3,118,511 bytes in 69,077 blocks
==9430==         suppressed: 0 bytes in 0 blocks
==9430== Rerun with --leak-check=full to see details of leaked memory
==9430== 
==9430== Use --track-origins=yes to see where uninitialised values come from
==9430== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9430== 
==9430== 1 errors in context 1 of 2:
==9430== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9430==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9430==    by 0x488CD0: stringsubst (subst.c:301)
==9430==    by 0x48801B: prefork (subst.c:77)
==9430==    by 0x42B318: execcmd (exec.c:2619)
==9430==    by 0x428CA0: execpline2 (exec.c:1697)
==9430==    by 0x427FD2: execpline (exec.c:1484)
==9430==    by 0x427756: execlist (exec.c:1267)
==9430==    by 0x42717C: execode (exec.c:1073)
==9430==    by 0x431299: runshfunc (exec.c:5040)
==9430==    by 0x430E76: doshfunc (exec.c:4920)
==9430==    by 0x4302FB: execshfunc (exec.c:4557)
==9430==    by 0x42D8C1: execcmd (exec.c:3373)
==9430== 
==9430== 
==9430== 2 errors in context 2 of 2:
==9430== Conditional jump or move depends on uninitialised value(s)
==9430==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9430==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9430==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9430==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9430==    by 0x42D8E9: execcmd (exec.c:3378)
==9430==    by 0x428CA0: execpline2 (exec.c:1697)
==9430==    by 0x427FD2: execpline (exec.c:1484)
==9430==    by 0x42779A: execlist (exec.c:1275)
==9430==    by 0x42717C: execode (exec.c:1073)
==9430==    by 0x431299: runshfunc (exec.c:5040)
==9430==    by 0x430E76: doshfunc (exec.c:4920)
==9430==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9430== 
==9430== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9442== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9442-by-pythonnut-on-???
==9442== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9442-by-pythonnut-on-???
==9442== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9442-by-pythonnut-on-???
==9442== 
==9442== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9442== don't want to do, unless you know exactly what you're doing,
==9442== or are doing some strange experiment):
==9442==   /usr/lib/valgrind/../../bin/vgdb --pid=9442 ...command...
==9442== 
==9442== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9442==   /path/to/gdb ./zsh
==9442== and then give GDB the following command
==9442==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9442
==9442== --pid is optional if only one valgrind process is running
==9442== 
--9442-- Caught __NR_exit; running __libc_freeres()
--9442-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9442== 
==9442== HEAP SUMMARY:
==9442==     in use at exit: 3,126,807 bytes in 69,092 blocks
==9442==   total heap usage: 935,908 allocs, 866,816 frees, 66,388,646 bytes allocated
==9442== 
==9438== Checked 4,852,816 bytes
==9438== 
==9442== Searching for pointers to 69,092 not-freed blocks
--9442--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9442--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9442--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9442--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9442--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9442--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9442--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9442--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9442--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9442--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9442--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9442--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9442--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9442--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9442--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9442--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9442--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9442--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9442--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9442--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9442--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9442--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9442--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9442--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9442--   Scanning root segment: 0x701a000..0x701afff (4096)
--9442--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9442--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9442--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9442--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9442--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9442--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9442--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9442--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9442--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9438== LEAK SUMMARY:
==9438==    definitely lost: 1,533 bytes in 8 blocks
==9438==    indirectly lost: 6,756 bytes in 7 blocks
==9438==      possibly lost: 0 bytes in 0 blocks
==9438==    still reachable: 3,144,979 bytes in 69,402 blocks
==9438==         suppressed: 0 bytes in 0 blocks
==9438== Rerun with --leak-check=full to see details of leaked memory
==9438== 
==9438== Use --track-origins=yes to see where uninitialised values come from
==9438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9438== 
==9438== 1 errors in context 1 of 2:
==9438== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9438==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9438==    by 0x488CD0: stringsubst (subst.c:301)
==9438==    by 0x48801B: prefork (subst.c:77)
==9438==    by 0x42B318: execcmd (exec.c:2619)
==9438==    by 0x428CA0: execpline2 (exec.c:1697)
==9438==    by 0x427FD2: execpline (exec.c:1484)
==9438==    by 0x427756: execlist (exec.c:1267)
==9438==    by 0x42717C: execode (exec.c:1073)
==9438==    by 0x431299: runshfunc (exec.c:5040)
==9438==    by 0x430E76: doshfunc (exec.c:4920)
==9438==    by 0x4302FB: execshfunc (exec.c:4557)
==9438==    by 0x42D8C1: execcmd (exec.c:3373)
==9438== 
==9438== 
==9438== 2 errors in context 2 of 2:
==9438== Conditional jump or move depends on uninitialised value(s)
==9438==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9438==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9438==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9438==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9438==    by 0x42D8E9: execcmd (exec.c:3378)
==9438==    by 0x428CA0: execpline2 (exec.c:1697)
==9438==    by 0x427FD2: execpline (exec.c:1484)
==9438==    by 0x42779A: execlist (exec.c:1275)
==9438==    by 0x42717C: execode (exec.c:1073)
==9438==    by 0x431299: runshfunc (exec.c:5040)
==9438==    by 0x430E76: doshfunc (exec.c:4920)
==9438==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9438== 
==9438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9441== Checked 4,973,128 bytes
==9441== 
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
==9441== LEAK SUMMARY:
==9441==    definitely lost: 1,533 bytes in 8 blocks
==9441==    indirectly lost: 6,756 bytes in 7 blocks
==9441==      possibly lost: 0 bytes in 0 blocks
==9441==    still reachable: 3,188,501 bytes in 69,113 blocks
==9441==         suppressed: 0 bytes in 0 blocks
==9441== Rerun with --leak-check=full to see details of leaked memory
==9441== 
==9441== Use --track-origins=yes to see where uninitialised values come from
==9441== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9441== 
==9441== 1 errors in context 1 of 2:
==9441== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9441==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9441==    by 0x488CD0: stringsubst (subst.c:301)
==9441==    by 0x48801B: prefork (subst.c:77)
==9441==    by 0x42B318: execcmd (exec.c:2619)
==9441==    by 0x428CA0: execpline2 (exec.c:1697)
==9441==    by 0x427FD2: execpline (exec.c:1484)
==9441==    by 0x427756: execlist (exec.c:1267)
==9441==    by 0x42717C: execode (exec.c:1073)
==9441==    by 0x431299: runshfunc (exec.c:5040)
==9441==    by 0x430E76: doshfunc (exec.c:4920)
==9441==    by 0x4302FB: execshfunc (exec.c:4557)
==9441==    by 0x42D8C1: execcmd (exec.c:3373)
==9441== 
==9441== 
==9441== 2 errors in context 2 of 2:
==9441== Conditional jump or move depends on uninitialised value(s)
==9441==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9441==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9441==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9441==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9441==    by 0x42D8E9: execcmd (exec.c:3378)
==9441==    by 0x428CA0: execpline2 (exec.c:1697)
==9441==    by 0x427FD2: execpline (exec.c:1484)
==9441==    by 0x42779A: execlist (exec.c:1275)
==9441==    by 0x42717C: execode (exec.c:1073)
==9441==    by 0x431299: runshfunc (exec.c:5040)
==9441==    by 0x430E76: doshfunc (exec.c:4920)
==9441==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9441== 
==9441== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9445== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9445-by-pythonnut-on-???
==9445== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9445-by-pythonnut-on-???
==9445== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9445-by-pythonnut-on-???
==9445== 
==9445== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9445== don't want to do, unless you know exactly what you're doing,
==9445== or are doing some strange experiment):
==9445==   /usr/lib/valgrind/../../bin/vgdb --pid=9445 ...command...
==9445== 
==9445== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9445==   /path/to/gdb ./zsh
==9445== and then give GDB the following command
==9445==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9445
==9445== --pid is optional if only one valgrind process is running
==9445== 
==9446== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9446-by-pythonnut-on-???
==9446== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9446-by-pythonnut-on-???
==9446== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9446-by-pythonnut-on-???
==9446== 
==9446== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9446== don't want to do, unless you know exactly what you're doing,
==9446== or are doing some strange experiment):
==9446==   /usr/lib/valgrind/../../bin/vgdb --pid=9446 ...command...
==9446== 
==9446== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9446==   /path/to/gdb ./zsh
==9446== and then give GDB the following command
==9446==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9446
==9446== --pid is optional if only one valgrind process is running
==9446== 
--9446-- Caught __NR_exit; running __libc_freeres()
--9446-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9446== 
==9442== Checked 4,795,080 bytes
==9442== 
==9446== HEAP SUMMARY:
==9446==     in use at exit: 3,161,803 bytes in 69,586 blocks
==9446==   total heap usage: 940,249 allocs, 870,663 frees, 68,480,976 bytes allocated
==9446== 
==9442== LEAK SUMMARY:
==9442==    definitely lost: 1,533 bytes in 8 blocks
==9442==    indirectly lost: 6,756 bytes in 7 blocks
==9442==      possibly lost: 0 bytes in 0 blocks
==9442==    still reachable: 3,118,518 bytes in 69,077 blocks
==9442==         suppressed: 0 bytes in 0 blocks
==9442== Rerun with --leak-check=full to see details of leaked memory
==9442== 
==9442== Use --track-origins=yes to see where uninitialised values come from
==9442== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9442== 
==9442== 1 errors in context 1 of 2:
==9442== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9442==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9442==    by 0x488CD0: stringsubst (subst.c:301)
==9442==    by 0x48801B: prefork (subst.c:77)
==9442==    by 0x42B318: execcmd (exec.c:2619)
==9442==    by 0x428CA0: execpline2 (exec.c:1697)
==9442==    by 0x427FD2: execpline (exec.c:1484)
==9442==    by 0x427756: execlist (exec.c:1267)
==9442==    by 0x42717C: execode (exec.c:1073)
==9442==    by 0x431299: runshfunc (exec.c:5040)
==9442==    by 0x430E76: doshfunc (exec.c:4920)
==9442==    by 0x4302FB: execshfunc (exec.c:4557)
==9442==    by 0x42D8C1: execcmd (exec.c:3373)
==9442== 
==9442== 
==9442== 2 errors in context 2 of 2:
==9442== Conditional jump or move depends on uninitialised value(s)
==9442==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9442==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9442==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9442==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9442==    by 0x42D8E9: execcmd (exec.c:3378)
==9442==    by 0x428CA0: execpline2 (exec.c:1697)
==9442==    by 0x427FD2: execpline (exec.c:1484)
==9442==    by 0x42779A: execlist (exec.c:1275)
==9442==    by 0x42717C: execode (exec.c:1073)
==9442==    by 0x431299: runshfunc (exec.c:5040)
==9442==    by 0x430E76: doshfunc (exec.c:4920)
==9442==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9442== 
==9442== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9446== Searching for pointers to 69,586 not-freed blocks
--9446--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9446--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9446--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9446--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9446--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9446--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9446--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9446--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9446--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9446--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9446--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9446--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9446--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9446--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9446--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9446--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9446--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9446--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9446--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9446--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9446--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9446--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9446--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9446--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9446--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9446--   Scanning root segment: 0x701a000..0x701afff (4096)
--9446--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9446--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9446--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9446--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9446--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9446--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9446--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9446--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9446--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9447-- Caught __NR_exit; running __libc_freeres()
==9447== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9447-by-pythonnut-on-???
==9447== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9447-by-pythonnut-on-???
==9447== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9447-by-pythonnut-on-???
==9447== 
==9447== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9447== don't want to do, unless you know exactly what you're doing,
==9447== or are doing some strange experiment):
==9447==   /usr/lib/valgrind/../../bin/vgdb --pid=9447 ...command...
==9447== 
==9447== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9447==   /path/to/gdb ./zsh
==9447== and then give GDB the following command
==9447==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9447
==9447== --pid is optional if only one valgrind process is running
==9447== 
--9447-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9447== 
==9447== HEAP SUMMARY:
==9447==     in use at exit: 3,126,903 bytes in 69,092 blocks
==9447==   total heap usage: 935,924 allocs, 866,832 frees, 66,393,433 bytes allocated
==9447== 
==9447== Searching for pointers to 69,092 not-freed blocks
--9447--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9447--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9447--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9447--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9447--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9447--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9447--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9447--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9447--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9447--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9447--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9447--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9447--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9447--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9447--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9447--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9447--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9447--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9447--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9447--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9447--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9447--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9447--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9447--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9447--   Scanning root segment: 0x701a000..0x701afff (4096)
--9447--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9447--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9447--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9447--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9447--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9447--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9447--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9447--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9447--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9446== Checked 4,880,528 bytes
==9446== 
==9446== LEAK SUMMARY:
==9446==    definitely lost: 1,533 bytes in 8 blocks
==9446==    indirectly lost: 6,756 bytes in 7 blocks
==9446==      possibly lost: 0 bytes in 0 blocks
==9446==    still reachable: 3,153,514 bytes in 69,571 blocks
==9446==         suppressed: 0 bytes in 0 blocks
==9446== Rerun with --leak-check=full to see details of leaked memory
==9446== 
==9446== Use --track-origins=yes to see where uninitialised values come from
==9446== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9446== 
==9446== 1 errors in context 1 of 2:
==9446== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9446==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9446==    by 0x488CD0: stringsubst (subst.c:301)
==9446==    by 0x48801B: prefork (subst.c:77)
==9446==    by 0x42B318: execcmd (exec.c:2619)
==9446==    by 0x428CA0: execpline2 (exec.c:1697)
==9446==    by 0x427FD2: execpline (exec.c:1484)
==9446==    by 0x427756: execlist (exec.c:1267)
==9446==    by 0x42717C: execode (exec.c:1073)
==9446==    by 0x431299: runshfunc (exec.c:5040)
==9446==    by 0x430E76: doshfunc (exec.c:4920)
==9446==    by 0x4302FB: execshfunc (exec.c:4557)
==9446==    by 0x42D8C1: execcmd (exec.c:3373)
==9446== 
==9446== 
==9446== 2 errors in context 2 of 2:
==9446== Conditional jump or move depends on uninitialised value(s)
==9446==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9446==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9446==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9446==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9446==    by 0x42D8E9: execcmd (exec.c:3378)
==9446==    by 0x428CA0: execpline2 (exec.c:1697)
==9446==    by 0x427FD2: execpline (exec.c:1484)
==9446==    by 0x42779A: execlist (exec.c:1275)
==9446==    by 0x42717C: execode (exec.c:1073)
==9446==    by 0x431299: runshfunc (exec.c:5040)
==9446==    by 0x430E76: doshfunc (exec.c:4920)
==9446==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9446== 
==9446== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9445-- Caught __NR_exit; running __libc_freeres()
--9445-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9445== 
==9445== HEAP SUMMARY:
==9445==     in use at exit: 3,159,428 bytes in 69,505 blocks
==9445==   total heap usage: 940,189 allocs, 870,684 frees, 68,251,078 bytes allocated
==9445== 
==9447== Checked 4,794,360 bytes
==9447== 
==9445== Searching for pointers to 69,505 not-freed blocks
--9445--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9445--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9445--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9445--   Scanning root segment: 0x4037000..0x4046fff (65536)
==9447== LEAK SUMMARY:
==9447==    definitely lost: 1,533 bytes in 8 blocks
==9447==    indirectly lost: 6,756 bytes in 7 blocks
==9447==      possibly lost: 0 bytes in 0 blocks
==9447==    still reachable: 3,118,614 bytes in 69,077 blocks
==9447==         suppressed: 0 bytes in 0 blocks
==9447== Rerun with --leak-check=full to see details of leaked memory
==9447== 
==9447== Use --track-origins=yes to see where uninitialised values come from
--9445--   Scanning root segment: 0x4049000..0x404cfff (16384)
==9447== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9447== 
==9447== 1 errors in context 1 of 2:
==9447== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9447==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9447==    by 0x488CD0: stringsubst (subst.c:301)
==9447==    by 0x48801B: prefork (subst.c:77)
==9447==    by 0x42B318: execcmd (exec.c:2619)
==9447==    by 0x428CA0: execpline2 (exec.c:1697)
==9447==    by 0x427FD2: execpline (exec.c:1484)
==9447==    by 0x427756: execlist (exec.c:1267)
==9447==    by 0x42717C: execode (exec.c:1073)
==9447==    by 0x431299: runshfunc (exec.c:5040)
==9447==    by 0x430E76: doshfunc (exec.c:4920)
==9447==    by 0x4302FB: execshfunc (exec.c:4557)
--9445--   Scanning root segment: 0x4222000..0x4222fff (4096)
==9447==    by 0x42D8C1: execcmd (exec.c:3373)
==9447== 
==9447== 
==9447== 2 errors in context 2 of 2:
--9445--   Scanning root segment: 0x4223000..0x4223fff (4096)
==9447== Conditional jump or move depends on uninitialised value(s)
==9447==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
--9445--   Scanning root segment: 0x4224000..0x4224fff (4096)
==9447==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9447==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
--9445--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
==9447==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9447==    by 0x42D8E9: execcmd (exec.c:3378)
--9445--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==9447==    by 0x428CA0: execpline2 (exec.c:1697)
==9447==    by 0x427FD2: execpline (exec.c:1484)
==9447==    by 0x42779A: execlist (exec.c:1275)
==9447==    by 0x42717C: execode (exec.c:1073)
==9447==    by 0x431299: runshfunc (exec.c:5040)
--9445--   Scanning root segment: 0x5041000..0x5041fff (4096)
==9447==    by 0x430E76: doshfunc (exec.c:4920)
==9447==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9447== 
==9447== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9445--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9445--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9445--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9445--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9445--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9445--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9445--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9445--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9445--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9445--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9445--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9445--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9445--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9445--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9445--   Scanning root segment: 0x701a000..0x701afff (4096)
--9445--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9445--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9445--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9445--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9445--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9445--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9445--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9445--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9445--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9448== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9448-by-pythonnut-on-???
==9448== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9448-by-pythonnut-on-???
==9448== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9448-by-pythonnut-on-???
==9448== 
==9448== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9448== don't want to do, unless you know exactly what you're doing,
==9448== or are doing some strange experiment):
==9448==   /usr/lib/valgrind/../../bin/vgdb --pid=9448 ...command...
==9448== 
==9448== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9448==   /path/to/gdb ./zsh
==9448== and then give GDB the following command
==9448==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9448
==9448== --pid is optional if only one valgrind process is running
==9448== 
--9448-- Caught __NR_exit; running __libc_freeres()
--9440-- Caught __NR_exit; running __libc_freeres()
--9448-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9448== 
==9448== HEAP SUMMARY:
==9448==     in use at exit: 3,127,145 bytes in 69,098 blocks
==9448==   total heap usage: 935,972 allocs, 866,874 frees, 66,402,449 bytes allocated
==9448== 
--9440-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9440== 
==9440== HEAP SUMMARY:
==9440==     in use at exit: 3,160,363 bytes in 69,128 blocks
==9440==   total heap usage: 939,349 allocs, 870,221 frees, 67,889,809 bytes allocated
==9440== 
==9445== Checked 4,876,592 bytes
==9445== 
==9448== Searching for pointers to 69,098 not-freed blocks
--9448--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9448--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9448--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9448--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9448--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9448--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9448--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9448--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9448--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9448--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9448--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9448--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9448--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9448--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9448--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9448--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9448--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9448--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9448--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9448--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9448--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9448--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9448--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9448--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9448--   Scanning root segment: 0x701a000..0x701afff (4096)
--9448--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9448--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9448--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9448--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9448--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9448--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9448--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9448--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9448--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9445== LEAK SUMMARY:
==9445==    definitely lost: 1,533 bytes in 8 blocks
==9445==    indirectly lost: 6,756 bytes in 7 blocks
==9445==      possibly lost: 0 bytes in 0 blocks
==9445==    still reachable: 3,151,139 bytes in 69,490 blocks
==9445==         suppressed: 0 bytes in 0 blocks
==9445== Rerun with --leak-check=full to see details of leaked memory
==9445== 
==9445== Use --track-origins=yes to see where uninitialised values come from
==9445== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9445== 
==9445== 1 errors in context 1 of 2:
==9445== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9445==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9445==    by 0x488CD0: stringsubst (subst.c:301)
==9445==    by 0x48801B: prefork (subst.c:77)
==9445==    by 0x42B318: execcmd (exec.c:2619)
==9445==    by 0x428CA0: execpline2 (exec.c:1697)
==9445==    by 0x427FD2: execpline (exec.c:1484)
==9445==    by 0x427756: execlist (exec.c:1267)
==9445==    by 0x42717C: execode (exec.c:1073)
==9445==    by 0x431299: runshfunc (exec.c:5040)
==9445==    by 0x430E76: doshfunc (exec.c:4920)
==9445==    by 0x4302FB: execshfunc (exec.c:4557)
==9445==    by 0x42D8C1: execcmd (exec.c:3373)
==9445== 
==9445== 
==9445== 2 errors in context 2 of 2:
==9445== Conditional jump or move depends on uninitialised value(s)
==9445==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9445==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9445==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9445==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9445==    by 0x42D8E9: execcmd (exec.c:3378)
==9445==    by 0x428CA0: execpline2 (exec.c:1697)
==9445==    by 0x427FD2: execpline (exec.c:1484)
==9445==    by 0x42779A: execlist (exec.c:1275)
==9445==    by 0x42717C: execode (exec.c:1073)
==9445==    by 0x431299: runshfunc (exec.c:5040)
==9445==    by 0x430E76: doshfunc (exec.c:4920)
==9445==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9445== 
==9445== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9440== Searching for pointers to 69,128 not-freed blocks
--9440--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9440--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
--9440--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9440--   Scanning root segment: 0x4037000..0x4043fff (53248)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
--9440--   Scanning root segment: 0x4049000..0x404cfff (16384)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
--9440--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9440--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9440--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9440--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9440--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9440--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9440--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9440--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9440--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9440--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9440--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9440--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9440--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9440--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9440--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9440--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9440--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9440--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9440--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
--9440--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9440--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9440--   Scanning root segment: 0x701a000..0x701afff (4096)
--9440--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9440--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9440--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9440--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9440--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9440--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9440--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9440--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
--9440--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF3DBC,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFE992C,  len 4
==9448== Checked 4,794,528 bytes
==9448== 
==9451== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9451-by-pythonnut-on-???
==9451== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9451-by-pythonnut-on-???
==9451== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9451-by-pythonnut-on-???
==9451== 
==9451== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9451== don't want to do, unless you know exactly what you're doing,
==9451== or are doing some strange experiment):
==9451==   /usr/lib/valgrind/../../bin/vgdb --pid=9451 ...command...
==9451== 
==9451== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9451==   /path/to/gdb ./zsh
==9451== and then give GDB the following command
==9451==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9451
==9451== --pid is optional if only one valgrind process is running
==9451== 
client request: code 4d430005,  addr 0xFFEFE87EC,  len 4
==9448== LEAK SUMMARY:
==9448==    definitely lost: 1,533 bytes in 8 blocks
==9448==    indirectly lost: 6,756 bytes in 7 blocks
==9448==      possibly lost: 0 bytes in 0 blocks
==9448==    still reachable: 3,118,856 bytes in 69,083 blocks
==9448==         suppressed: 0 bytes in 0 blocks
==9448== Rerun with --leak-check=full to see details of leaked memory
==9448== 
==9448== Use --track-origins=yes to see where uninitialised values come from
==9448== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9448== 
==9448== 1 errors in context 1 of 2:
==9448== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9448==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9448==    by 0x488CD0: stringsubst (subst.c:301)
==9448==    by 0x48801B: prefork (subst.c:77)
==9448==    by 0x42B318: execcmd (exec.c:2619)
==9448==    by 0x428CA0: execpline2 (exec.c:1697)
==9448==    by 0x427FD2: execpline (exec.c:1484)
==9448==    by 0x427756: execlist (exec.c:1267)
==9448==    by 0x42717C: execode (exec.c:1073)
==9448==    by 0x431299: runshfunc (exec.c:5040)
==9448==    by 0x430E76: doshfunc (exec.c:4920)
==9448==    by 0x4302FB: execshfunc (exec.c:4557)
==9448==    by 0x42D8C1: execcmd (exec.c:3373)
==9448== 
==9448== 
==9448== 2 errors in context 2 of 2:
==9448== Conditional jump or move depends on uninitialised value(s)
==9448==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9448==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9448==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9448==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9448==    by 0x42D8E9: execcmd (exec.c:3378)
==9448==    by 0x428CA0: execpline2 (exec.c:1697)
==9448==    by 0x427FD2: execpline (exec.c:1484)
==9448==    by 0x42779A: execlist (exec.c:1275)
==9448==    by 0x42717C: execode (exec.c:1073)
==9448==    by 0x431299: runshfunc (exec.c:5040)
==9448==    by 0x430E76: doshfunc (exec.c:4920)
==9448==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9448== 
==9448== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9450== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9450-by-pythonnut-on-???
==9450== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9450-by-pythonnut-on-???
==9450== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9450-by-pythonnut-on-???
==9450== 
==9450== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9450== don't want to do, unless you know exactly what you're doing,
==9450== or are doing some strange experiment):
==9450==   /usr/lib/valgrind/../../bin/vgdb --pid=9450 ...command...
==9450== 
==9450== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9450==   /path/to/gdb ./zsh
==9450== and then give GDB the following command
==9450==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9450
==9450== --pid is optional if only one valgrind process is running
==9450== 
==9440== Checked 4,936,016 bytes
==9440== 
--9450-- Caught __NR_exit; running __libc_freeres()
--9452-- Caught __NR_exit; running __libc_freeres()
==9452== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9452-by-pythonnut-on-???
==9452== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9452-by-pythonnut-on-???
==9452== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9452-by-pythonnut-on-???
==9452== 
==9452== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9452== don't want to do, unless you know exactly what you're doing,
==9452== or are doing some strange experiment):
==9452==   /usr/lib/valgrind/../../bin/vgdb --pid=9452 ...command...
==9452== 
==9452== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9452==   /path/to/gdb ./zsh
==9452== and then give GDB the following command
==9452==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9452
==9452== --pid is optional if only one valgrind process is running
==9452== 
==9440== LEAK SUMMARY:
==9440==    definitely lost: 1,533 bytes in 8 blocks
==9440==    indirectly lost: 6,756 bytes in 7 blocks
==9440==      possibly lost: 0 bytes in 0 blocks
==9440==    still reachable: 3,152,074 bytes in 69,113 blocks
==9440==         suppressed: 0 bytes in 0 blocks
==9440== Rerun with --leak-check=full to see details of leaked memory
==9440== 
==9440== Use --track-origins=yes to see where uninitialised values come from
==9440== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9440== 
==9440== 1 errors in context 1 of 2:
==9440== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9440==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9440==    by 0x488CD0: stringsubst (subst.c:301)
==9440==    by 0x48801B: prefork (subst.c:77)
==9440==    by 0x42B318: execcmd (exec.c:2619)
==9440==    by 0x428CA0: execpline2 (exec.c:1697)
==9440==    by 0x427FD2: execpline (exec.c:1484)
==9440==    by 0x427756: execlist (exec.c:1267)
==9440==    by 0x42717C: execode (exec.c:1073)
==9440==    by 0x431299: runshfunc (exec.c:5040)
==9440==    by 0x430E76: doshfunc (exec.c:4920)
==9440==    by 0x4302FB: execshfunc (exec.c:4557)
==9440==    by 0x42D8C1: execcmd (exec.c:3373)
==9440== 
==9440== 
==9440== 2 errors in context 2 of 2:
==9440== Conditional jump or move depends on uninitialised value(s)
==9440==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9440==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9440==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9440==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9440==    by 0x42D8E9: execcmd (exec.c:3378)
==9440==    by 0x428CA0: execpline2 (exec.c:1697)
==9440==    by 0x427FD2: execpline (exec.c:1484)
==9440==    by 0x42779A: execlist (exec.c:1275)
==9440==    by 0x42717C: execode (exec.c:1073)
==9440==    by 0x431299: runshfunc (exec.c:5040)
==9440==    by 0x430E76: doshfunc (exec.c:4920)
==9440==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9440== 
==9440== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9450-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9450== 
--9452-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9450== HEAP SUMMARY:
==9450==     in use at exit: 3,168,179 bytes in 69,594 blocks
==9450==   total heap usage: 940,514 allocs, 870,920 frees, 68,297,051 bytes allocated
==9450== 
==9452== 
==9452== HEAP SUMMARY:
==9452==     in use at exit: 3,127,081 bytes in 69,098 blocks
==9452==   total heap usage: 935,952 allocs, 866,854 frees, 66,400,219 bytes allocated
==9452== 
==9453== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9453-by-pythonnut-on-???
==9453== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9453-by-pythonnut-on-???
==9453== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9453-by-pythonnut-on-???
==9453== 
==9453== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9453== don't want to do, unless you know exactly what you're doing,
==9453== or are doing some strange experiment):
==9453==   /usr/lib/valgrind/../../bin/vgdb --pid=9453 ...command...
==9453== 
==9453== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9453==   /path/to/gdb ./zsh
==9453== and then give GDB the following command
==9453==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9453
==9453== --pid is optional if only one valgrind process is running
==9453== 
--9453-- Caught __NR_exit; running __libc_freeres()
==9450== Searching for pointers to 69,594 not-freed blocks
--9450--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9450--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9450--   Scanning root segment: 0x4022000..0x4026fff (20480)
client request: code 4d430005,  addr 0xFFEFEDFFC,  len 4
--9450--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9450--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9450--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9450--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9450--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9450--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9450--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9450--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9450--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9450--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9450--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9450--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9450--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9450--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9450--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9450--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9450--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9450--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9450--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9450--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9450--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9450--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9450--   Scanning root segment: 0x701a000..0x701afff (4096)
--9450--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9450--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9450--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9450--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9450--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9450--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9450--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9450--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9450--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9452== Searching for pointers to 69,098 not-freed blocks
--9452--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9452--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9452--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9452--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9452--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9452--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9452--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9452--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9452--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9452--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9452--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9452--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9452--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9452--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9452--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9452--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9452--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9452--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9452--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9452--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9452--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9452--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9452--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9452--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9452--   Scanning root segment: 0x701a000..0x701afff (4096)
--9452--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9452--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9452--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9452--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9452--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9452--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9452--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9452--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9452--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9454-- Caught __NR_exit; running __libc_freeres()
--9453-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9453== 
==9454== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9454-by-pythonnut-on-???
==9454== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9454-by-pythonnut-on-???
==9454== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9454-by-pythonnut-on-???
==9454== 
==9454== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9454== don't want to do, unless you know exactly what you're doing,
==9454== or are doing some strange experiment):
==9454==   /usr/lib/valgrind/../../bin/vgdb --pid=9454 ...command...
==9454== 
==9454== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9454==   /path/to/gdb ./zsh
==9454== and then give GDB the following command
==9454==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9454
==9454== --pid is optional if only one valgrind process is running
==9454== 
==9453== HEAP SUMMARY:
==9453==     in use at exit: 3,166,577 bytes in 69,128 blocks
==9453==   total heap usage: 935,636 allocs, 866,508 frees, 66,670,146 bytes allocated
==9453== 
--9454-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9454== 
==9454== HEAP SUMMARY:
==9454==     in use at exit: 3,145,105 bytes in 69,128 blocks
==9454==   total heap usage: 935,642 allocs, 866,514 frees, 66,672,266 bytes allocated
==9454== 
==9453== Searching for pointers to 69,128 not-freed blocks
--9453--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9453--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9453--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9453--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9453--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9453--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--9453--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9453--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9453--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9453--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9453--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9453--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9453--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9453--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9453--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9453--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9453--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9453--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9453--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9453--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9453--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9453--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9453--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9453--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9453--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9453--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9453--   Scanning root segment: 0x701a000..0x701afff (4096)
--9453--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9453--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9453--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9453--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9453--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9453--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9453--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9453--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9453--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9454== Searching for pointers to 69,128 not-freed blocks
--9454--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9454--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9454--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9454--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9454--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9454--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--9454--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9454--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9454--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9454--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9454--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9454--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9454--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9454--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9454--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9454--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9454--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9454--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9454--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9454--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9454--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9454--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9454--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9454--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9454--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9454--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9454--   Scanning root segment: 0x701a000..0x701afff (4096)
--9454--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==9450== Checked 4,889,672 bytes
==9450== 
--9454--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9454--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9454--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9454--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9454--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9454--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9454--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9454--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9450== LEAK SUMMARY:
==9450==    definitely lost: 1,533 bytes in 8 blocks
==9450==    indirectly lost: 6,756 bytes in 7 blocks
==9450==      possibly lost: 0 bytes in 0 blocks
==9450==    still reachable: 3,159,890 bytes in 69,579 blocks
==9450==         suppressed: 0 bytes in 0 blocks
==9450== Rerun with --leak-check=full to see details of leaked memory
==9450== 
==9450== Use --track-origins=yes to see where uninitialised values come from
==9450== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9450== 
==9450== 1 errors in context 1 of 2:
==9450== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9450==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9450==    by 0x488CD0: stringsubst (subst.c:301)
==9450==    by 0x48801B: prefork (subst.c:77)
==9450==    by 0x42B318: execcmd (exec.c:2619)
==9450==    by 0x428CA0: execpline2 (exec.c:1697)
==9450==    by 0x427FD2: execpline (exec.c:1484)
==9450==    by 0x427756: execlist (exec.c:1267)
==9450==    by 0x42717C: execode (exec.c:1073)
==9450==    by 0x431299: runshfunc (exec.c:5040)
==9450==    by 0x430E76: doshfunc (exec.c:4920)
==9450==    by 0x4302FB: execshfunc (exec.c:4557)
==9450==    by 0x42D8C1: execcmd (exec.c:3373)
==9450== 
==9450== 
==9450== 2 errors in context 2 of 2:
==9450== Conditional jump or move depends on uninitialised value(s)
==9450==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9450==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9450==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9450==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9450==    by 0x42D8E9: execcmd (exec.c:3378)
==9450==    by 0x428CA0: execpline2 (exec.c:1697)
==9450==    by 0x427FD2: execpline (exec.c:1484)
==9450==    by 0x42779A: execlist (exec.c:1275)
==9450==    by 0x42717C: execode (exec.c:1073)
==9450==    by 0x431299: runshfunc (exec.c:5040)
==9450==    by 0x430E76: doshfunc (exec.c:4920)
==9450==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9450== 
==9450== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9452== Checked 4,794,456 bytes
==9452== 
--9457-- Caught __NR_exit; running __libc_freeres()
==9452== LEAK SUMMARY:
==9452==    definitely lost: 1,533 bytes in 8 blocks
==9452==    indirectly lost: 6,756 bytes in 7 blocks
==9452==      possibly lost: 0 bytes in 0 blocks
==9452==    still reachable: 3,118,792 bytes in 69,083 blocks
==9452==         suppressed: 0 bytes in 0 blocks
==9452== Rerun with --leak-check=full to see details of leaked memory
==9452== 
==9452== Use --track-origins=yes to see where uninitialised values come from
==9452== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9452== 
==9452== 1 errors in context 1 of 2:
==9452== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9452==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9452==    by 0x488CD0: stringsubst (subst.c:301)
==9452==    by 0x48801B: prefork (subst.c:77)
==9452==    by 0x42B318: execcmd (exec.c:2619)
==9452==    by 0x428CA0: execpline2 (exec.c:1697)
==9452==    by 0x427FD2: execpline (exec.c:1484)
==9452==    by 0x427756: execlist (exec.c:1267)
==9452==    by 0x42717C: execode (exec.c:1073)
==9452==    by 0x431299: runshfunc (exec.c:5040)
==9452==    by 0x430E76: doshfunc (exec.c:4920)
==9452==    by 0x4302FB: execshfunc (exec.c:4557)
==9452==    by 0x42D8C1: execcmd (exec.c:3373)
==9452== 
==9452== 
==9452== 2 errors in context 2 of 2:
==9452== Conditional jump or move depends on uninitialised value(s)
==9452==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9452==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9452==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9452==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9452==    by 0x42D8E9: execcmd (exec.c:3378)
==9452==    by 0x428CA0: execpline2 (exec.c:1697)
==9452==    by 0x427FD2: execpline (exec.c:1484)
==9452==    by 0x42779A: execlist (exec.c:1275)
==9452==    by 0x42717C: execode (exec.c:1073)
==9452==    by 0x431299: runshfunc (exec.c:5040)
==9452==    by 0x430E76: doshfunc (exec.c:4920)
==9452==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9452== 
==9452== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE7F8C,  len 4
==9457== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9457-by-pythonnut-on-???
==9457== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9457-by-pythonnut-on-???
==9457== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9457-by-pythonnut-on-???
==9457== 
==9457== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9457== don't want to do, unless you know exactly what you're doing,
==9457== or are doing some strange experiment):
==9457==   /usr/lib/valgrind/../../bin/vgdb --pid=9457 ...command...
==9457== 
==9457== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9457==   /path/to/gdb ./zsh
==9457== and then give GDB the following command
==9457==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9457
==9457== --pid is optional if only one valgrind process is running
==9457== 
--9457-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9459-by-pythonnut-on-???
==9459== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9459-by-pythonnut-on-???
==9459== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9459-by-pythonnut-on-???
==9459== 
==9459== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9459== don't want to do, unless you know exactly what you're doing,
==9459== or are doing some strange experiment):
==9459==   /usr/lib/valgrind/../../bin/vgdb --pid=9459 ...command...
==9459== 
==9459== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9459==   /path/to/gdb ./zsh
==9459== and then give GDB the following command
==9459==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9459
==9459== --pid is optional if only one valgrind process is running
==9459== 
==9457== 
==9453== Checked 5,077,056 bytes
==9453== 
==9457== HEAP SUMMARY:
==9457==     in use at exit: 3,168,335 bytes in 69,600 blocks
==9457==   total heap usage: 940,523 allocs, 870,923 frees, 68,299,047 bytes allocated
==9457== 
--9459-- Caught __NR_exit; running __libc_freeres()
==9453== LEAK SUMMARY:
==9453==    definitely lost: 1,533 bytes in 8 blocks
==9453==    indirectly lost: 6,756 bytes in 7 blocks
==9453==      possibly lost: 0 bytes in 0 blocks
==9453==    still reachable: 3,158,288 bytes in 69,113 blocks
==9453==         suppressed: 0 bytes in 0 blocks
==9453== Rerun with --leak-check=full to see details of leaked memory
==9453== 
==9453== Use --track-origins=yes to see where uninitialised values come from
==9453== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9453== 
==9453== 1 errors in context 1 of 2:
==9453== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9453==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9453==    by 0x488CD0: stringsubst (subst.c:301)
==9453==    by 0x48801B: prefork (subst.c:77)
==9453==    by 0x42B318: execcmd (exec.c:2619)
==9453==    by 0x428CA0: execpline2 (exec.c:1697)
==9453==    by 0x427FD2: execpline (exec.c:1484)
==9453==    by 0x427756: execlist (exec.c:1267)
==9453==    by 0x42717C: execode (exec.c:1073)
==9453==    by 0x431299: runshfunc (exec.c:5040)
==9453==    by 0x430E76: doshfunc (exec.c:4920)
==9453==    by 0x4302FB: execshfunc (exec.c:4557)
==9453==    by 0x42D8C1: execcmd (exec.c:3373)
==9453== 
==9453== 
==9453== 2 errors in context 2 of 2:
==9453== Conditional jump or move depends on uninitialised value(s)
==9453==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9453==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9453==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9453==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9453==    by 0x42D8E9: execcmd (exec.c:3378)
==9453==    by 0x428CA0: execpline2 (exec.c:1697)
==9453==    by 0x427FD2: execpline (exec.c:1484)
==9453==    by 0x42779A: execlist (exec.c:1275)
==9453==    by 0x42717C: execode (exec.c:1073)
==9453==    by 0x431299: runshfunc (exec.c:5040)
==9453==    by 0x430E76: doshfunc (exec.c:4920)
==9453==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9453== 
==9453== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9457== Searching for pointers to 69,600 not-freed blocks
--9457--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9457--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9457--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9457--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9457--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9457--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9457--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9457--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9457--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9457--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9457--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9457--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9457--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9457--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9457--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9457--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9457--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9457--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9457--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9457--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9457--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9457--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9457--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9457--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9457--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9457--   Scanning root segment: 0x701a000..0x701afff (4096)
--9457--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9457--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9457--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9457--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9457--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9457--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9457--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9457--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9457--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9454== Checked 5,055,704 bytes
==9454== 
--9459-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== 
==9459== HEAP SUMMARY:
==9459==     in use at exit: 3,127,122 bytes in 69,099 blocks
==9459==   total heap usage: 935,965 allocs, 866,866 frees, 66,402,919 bytes allocated
==9459== 
==9454== LEAK SUMMARY:
==9454==    definitely lost: 1,557 bytes in 9 blocks
==9454==    indirectly lost: 6,796 bytes in 9 blocks
==9454==      possibly lost: 0 bytes in 0 blocks
==9454==    still reachable: 3,136,752 bytes in 69,110 blocks
==9454==         suppressed: 0 bytes in 0 blocks
==9454== Rerun with --leak-check=full to see details of leaked memory
==9454== 
==9454== Use --track-origins=yes to see where uninitialised values come from
==9454== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9454== 
==9454== 1 errors in context 1 of 2:
==9454== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9454==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9454==    by 0x488CD0: stringsubst (subst.c:301)
==9454==    by 0x48801B: prefork (subst.c:77)
==9454==    by 0x42B318: execcmd (exec.c:2619)
==9454==    by 0x428CA0: execpline2 (exec.c:1697)
==9454==    by 0x427FD2: execpline (exec.c:1484)
==9454==    by 0x427756: execlist (exec.c:1267)
==9454==    by 0x42717C: execode (exec.c:1073)
==9454==    by 0x431299: runshfunc (exec.c:5040)
==9454==    by 0x430E76: doshfunc (exec.c:4920)
==9454==    by 0x4302FB: execshfunc (exec.c:4557)
==9454==    by 0x42D8C1: execcmd (exec.c:3373)
==9454== 
==9454== 
==9454== 2 errors in context 2 of 2:
==9454== Conditional jump or move depends on uninitialised value(s)
==9454==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9454==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9454==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9454==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9454==    by 0x42D8E9: execcmd (exec.c:3378)
==9454==    by 0x428CA0: execpline2 (exec.c:1697)
==9454==    by 0x427FD2: execpline (exec.c:1484)
==9454==    by 0x42779A: execlist (exec.c:1275)
==9454==    by 0x42717C: execode (exec.c:1073)
==9454==    by 0x431299: runshfunc (exec.c:5040)
==9454==    by 0x430E76: doshfunc (exec.c:4920)
==9454==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9454== 
==9454== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9460== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9460-by-pythonnut-on-???
==9460== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9460-by-pythonnut-on-???
==9460== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9460-by-pythonnut-on-???
==9460== 
==9460== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9460== don't want to do, unless you know exactly what you're doing,
==9460== or are doing some strange experiment):
==9460==   /usr/lib/valgrind/../../bin/vgdb --pid=9460 ...command...
==9460== 
==9460== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9460==   /path/to/gdb ./zsh
==9460== and then give GDB the following command
==9460==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9460
==9460== --pid is optional if only one valgrind process is running
==9460== 
==9459== Searching for pointers to 69,099 not-freed blocks
--9459--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9459--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9459--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9459--   Scanning root segment: 0x4037000..0x403afff (16384)
--9459--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9459--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9459--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9459--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9459--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9459--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9459--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9459--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9459--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9459--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9459--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9459--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9459--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9459--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9459--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9459--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9459--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9459--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9459--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9459--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9459--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9459--   Scanning root segment: 0x701a000..0x701afff (4096)
--9459--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9459--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9459--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9459--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9459--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9459--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9459--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9459--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9459--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEE97C,  len 4
--9435-- Caught __NR_exit; running __libc_freeres()
--9435-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9435== 
==9435== HEAP SUMMARY:
==9435==     in use at exit: 3,122,924 bytes in 69,110 blocks
==9435==   total heap usage: 935,643 allocs, 866,533 frees, 66,672,834 bytes allocated
==9435== 
==9457== Checked 4,890,952 bytes
==9457== 
==9457== LEAK SUMMARY:
==9457==    definitely lost: 1,533 bytes in 8 blocks
==9457==    indirectly lost: 6,756 bytes in 7 blocks
==9457==      possibly lost: 0 bytes in 0 blocks
==9457==    still reachable: 3,160,046 bytes in 69,585 blocks
==9457==         suppressed: 0 bytes in 0 blocks
==9457== Rerun with --leak-check=full to see details of leaked memory
==9457== 
==9457== Use --track-origins=yes to see where uninitialised values come from
==9457== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9457== 
==9457== 1 errors in context 1 of 2:
==9457== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9457==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9435== Searching for pointers to 69,110 not-freed blocks
==9457==    by 0x488CD0: stringsubst (subst.c:301)
--9435--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==9457==    by 0x48801B: prefork (subst.c:77)
==9457==    by 0x42B318: execcmd (exec.c:2619)
==9457==    by 0x428CA0: execpline2 (exec.c:1697)
==9457==    by 0x427FD2: execpline (exec.c:1484)
==9457==    by 0x427756: execlist (exec.c:1267)
==9457==    by 0x42717C: execode (exec.c:1073)
==9457==    by 0x431299: runshfunc (exec.c:5040)
==9457==    by 0x430E76: doshfunc (exec.c:4920)
==9457==    by 0x4302FB: execshfunc (exec.c:4557)
==9457==    by 0x42D8C1: execcmd (exec.c:3373)
==9457== 
==9457== 
==9457== 2 errors in context 2 of 2:
==9457== Conditional jump or move depends on uninitialised value(s)
==9457==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9457==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9457==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9457==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9457==    by 0x42D8E9: execcmd (exec.c:3378)
==9457==    by 0x428CA0: execpline2 (exec.c:1697)
==9457==    by 0x427FD2: execpline (exec.c:1484)
==9457==    by 0x42779A: execlist (exec.c:1275)
==9457==    by 0x42717C: execode (exec.c:1073)
--9435--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9457==    by 0x431299: runshfunc (exec.c:5040)
==9457==    by 0x430E76: doshfunc (exec.c:4920)
==9457==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9457== 
==9457== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9435--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9435--   Scanning root segment: 0x4037000..0x403afff (16384)
--9435--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9435--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9435--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9435--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9435--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9435--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9435--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9435--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9435--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9435--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9435--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9435--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9435--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9435--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9435--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9435--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9435--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9435--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9435--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9435--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9435--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9435--   Scanning root segment: 0x701a000..0x701afff (4096)
--9435--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9435--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9435--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9435--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9435--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9435--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9435--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9435--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9435--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9456-- Caught __NR_exit; running __libc_freeres()
==9456== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9456-by-pythonnut-on-???
==9456== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9456-by-pythonnut-on-???
==9456== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9456-by-pythonnut-on-???
==9456== 
==9456== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9456== don't want to do, unless you know exactly what you're doing,
==9456== or are doing some strange experiment):
==9456==   /usr/lib/valgrind/../../bin/vgdb --pid=9456 ...command...
==9456== 
==9456== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9456==   /path/to/gdb ./zsh
==9456== and then give GDB the following command
==9456==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9456
==9456== --pid is optional if only one valgrind process is running
==9456== 
==9459== Checked 4,810,368 bytes
==9459== 
--9456-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== LEAK SUMMARY:
==9459==    definitely lost: 1,533 bytes in 8 blocks
==9459==    indirectly lost: 6,756 bytes in 7 blocks
==9459==      possibly lost: 0 bytes in 0 blocks
==9459==    still reachable: 3,118,833 bytes in 69,084 blocks
==9459==         suppressed: 0 bytes in 0 blocks
==9459== Rerun with --leak-check=full to see details of leaked memory
==9459== 
==9459== Use --track-origins=yes to see where uninitialised values come from
==9459== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9459== 
==9459== 1 errors in context 1 of 2:
==9459== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9459==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9459==    by 0x488CD0: stringsubst (subst.c:301)
==9459==    by 0x48801B: prefork (subst.c:77)
==9459==    by 0x42B318: execcmd (exec.c:2619)
==9459==    by 0x428CA0: execpline2 (exec.c:1697)
==9459==    by 0x427FD2: execpline (exec.c:1484)
==9459==    by 0x427756: execlist (exec.c:1267)
==9459==    by 0x42717C: execode (exec.c:1073)
==9459==    by 0x431299: runshfunc (exec.c:5040)
==9459==    by 0x430E76: doshfunc (exec.c:4920)
==9459==    by 0x4302FB: execshfunc (exec.c:4557)
==9459==    by 0x42D8C1: execcmd (exec.c:3373)
==9459== 
==9459== 
==9459== 2 errors in context 2 of 2:
==9459== Conditional jump or move depends on uninitialised value(s)
==9459==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9459==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9459==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9459==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9459==    by 0x42D8E9: execcmd (exec.c:3378)
==9459==    by 0x428CA0: execpline2 (exec.c:1697)
==9459==    by 0x427FD2: execpline (exec.c:1484)
==9459==    by 0x42779A: execlist (exec.c:1275)
==9459==    by 0x42717C: execode (exec.c:1073)
==9459==    by 0x431299: runshfunc (exec.c:5040)
==9459==    by 0x430E76: doshfunc (exec.c:4920)
==9459==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9459== 
==9459== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9456== 
==9456== HEAP SUMMARY:
==9456==     in use at exit: 3,168,271 bytes in 69,597 blocks
==9456==   total heap usage: 940,525 allocs, 870,928 frees, 68,299,591 bytes allocated
==9456== 
==9456== Searching for pointers to 69,597 not-freed blocks
--9456--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9456--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9456--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9456--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9456--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9456--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9456--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9456--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9456--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9456--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9456--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9456--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9456--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9456--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9456--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9456--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9456--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9456--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9456--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9456--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9456--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9456--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9456--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9456--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9456--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9456--   Scanning root segment: 0x701a000..0x701afff (4096)
--9456--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9456--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9456--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9456--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9456--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9456--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9456--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9456--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9456--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9435== Checked 4,785,696 bytes
==9435== 
==9435== LEAK SUMMARY:
==9435==    definitely lost: 1,533 bytes in 8 blocks
==9435==    indirectly lost: 6,756 bytes in 7 blocks
==9435==      possibly lost: 0 bytes in 0 blocks
==9435==    still reachable: 3,114,635 bytes in 69,095 blocks
==9435==         suppressed: 0 bytes in 0 blocks
==9435== Rerun with --leak-check=full to see details of leaked memory
==9435== 
==9435== Use --track-origins=yes to see where uninitialised values come from
==9435== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9435== 
==9435== 1 errors in context 1 of 2:
==9435== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9435==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9435==    by 0x488CD0: stringsubst (subst.c:301)
==9435==    by 0x48801B: prefork (subst.c:77)
==9435==    by 0x42B318: execcmd (exec.c:2619)
==9435==    by 0x428CA0: execpline2 (exec.c:1697)
==9435==    by 0x427FD2: execpline (exec.c:1484)
==9435==    by 0x427756: execlist (exec.c:1267)
==9435==    by 0x42717C: execode (exec.c:1073)
==9435==    by 0x431299: runshfunc (exec.c:5040)
==9435==    by 0x430E76: doshfunc (exec.c:4920)
==9435==    by 0x4302FB: execshfunc (exec.c:4557)
==9435==    by 0x42D8C1: execcmd (exec.c:3373)
==9435== 
==9435== 
==9435== 2 errors in context 2 of 2:
==9435== Conditional jump or move depends on uninitialised value(s)
==9435==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9435==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9435==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9435==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9435==    by 0x42D8E9: execcmd (exec.c:3378)
==9435==    by 0x428CA0: execpline2 (exec.c:1697)
==9435==    by 0x427FD2: execpline (exec.c:1484)
==9435==    by 0x42779A: execlist (exec.c:1275)
==9435==    by 0x42717C: execode (exec.c:1073)
==9435==    by 0x431299: runshfunc (exec.c:5040)
==9435==    by 0x430E76: doshfunc (exec.c:4920)
==9435==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9435== 
==9435== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9463-by-pythonnut-on-???
==9463== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9463-by-pythonnut-on-???
==9463== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9463-by-pythonnut-on-???
==9463== 
==9463== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9463== don't want to do, unless you know exactly what you're doing,
==9463== or are doing some strange experiment):
==9463==   /usr/lib/valgrind/../../bin/vgdb --pid=9463 ...command...
==9463== 
==9463== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9463==   /path/to/gdb ./zsh
==9463== and then give GDB the following command
==9463==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9463
==9463== --pid is optional if only one valgrind process is running
==9463== 
--9463-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEF77C,  len 4
==9456== Checked 4,890,264 bytes
==9456== 
--9463-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9456== LEAK SUMMARY:
==9456==    definitely lost: 1,533 bytes in 8 blocks
==9456==    indirectly lost: 6,756 bytes in 7 blocks
==9456==      possibly lost: 0 bytes in 0 blocks
==9456==    still reachable: 3,159,982 bytes in 69,582 blocks
==9456==         suppressed: 0 bytes in 0 blocks
==9456== Rerun with --leak-check=full to see details of leaked memory
==9456== 
==9456== Use --track-origins=yes to see where uninitialised values come from
==9456== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9456== 
==9456== 1 errors in context 1 of 2:
==9456== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9456==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9456==    by 0x488CD0: stringsubst (subst.c:301)
==9456==    by 0x48801B: prefork (subst.c:77)
==9456==    by 0x42B318: execcmd (exec.c:2619)
==9456==    by 0x428CA0: execpline2 (exec.c:1697)
==9456==    by 0x427FD2: execpline (exec.c:1484)
==9456==    by 0x427756: execlist (exec.c:1267)
==9456==    by 0x42717C: execode (exec.c:1073)
==9456==    by 0x431299: runshfunc (exec.c:5040)
==9456==    by 0x430E76: doshfunc (exec.c:4920)
==9456==    by 0x4302FB: execshfunc (exec.c:4557)
==9456==    by 0x42D8C1: execcmd (exec.c:3373)
==9456== 
==9456== 
==9456== 2 errors in context 2 of 2:
==9456== Conditional jump or move depends on uninitialised value(s)
==9456==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9456==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9456==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9456==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9456==    by 0x42D8E9: execcmd (exec.c:3378)
==9456==    by 0x428CA0: execpline2 (exec.c:1697)
==9456==    by 0x427FD2: execpline (exec.c:1484)
==9456==    by 0x42779A: execlist (exec.c:1275)
==9456==    by 0x42717C: execode (exec.c:1073)
==9456==    by 0x431299: runshfunc (exec.c:5040)
==9456==    by 0x430E76: doshfunc (exec.c:4920)
==9456==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9456== 
==9456== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== 
==9463== HEAP SUMMARY:
==9463==     in use at exit: 3,160,434 bytes in 69,111 blocks
==9463==   total heap usage: 935,607 allocs, 866,496 frees, 66,623,672 bytes allocated
==9463== 
==9465== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9465-by-pythonnut-on-???
==9465== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9465-by-pythonnut-on-???
==9465== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9465-by-pythonnut-on-???
==9465== 
==9465== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9465== don't want to do, unless you know exactly what you're doing,
==9465== or are doing some strange experiment):
==9465==   /usr/lib/valgrind/../../bin/vgdb --pid=9465 ...command...
==9465== 
==9465== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9465==   /path/to/gdb ./zsh
==9465== and then give GDB the following command
==9465==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9465
==9465== --pid is optional if only one valgrind process is running
==9465== 
--9466-- Caught __NR_exit; running __libc_freeres()
==9463== Searching for pointers to 69,111 not-freed blocks
--9463--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9463--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9463--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9463--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9463--   Scanning root segment: 0x41d6000..0x41edfff (98304)
--9463--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9463--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9463--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9463--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9463--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9463--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9463--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9463--   Scanning root segment: 0x54ac000..0x54acfff (4096)
client request: code 4d430005,  addr 0xFFEFE77CC,  len 4
--9463--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9463--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9463--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9463--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9463--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9463--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9463--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9463--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9463--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9463--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9463--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9463--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9463--   Scanning root segment: 0x701a000..0x701afff (4096)
--9463--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9463--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9463--   Scanning root segment: 0xae51000..0xae52fff (8192)
==9466== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9466-by-pythonnut-on-???
==9466== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9466-by-pythonnut-on-???
==9466== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9466-by-pythonnut-on-???
==9466== 
==9466== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9466== don't want to do, unless you know exactly what you're doing,
==9466== or are doing some strange experiment):
==9466==   /usr/lib/valgrind/../../bin/vgdb --pid=9466 ...command...
==9466== 
==9466== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9466==   /path/to/gdb ./zsh
==9466== and then give GDB the following command
==9466==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9466
==9466== --pid is optional if only one valgrind process is running
==9466== 
--9463--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9463--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9463--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9463--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9463--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9463--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9466-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9466== 
==9466== HEAP SUMMARY:
==9466==     in use at exit: 3,168,432 bytes in 69,603 blocks
==9466==   total heap usage: 940,530 allocs, 870,927 frees, 68,301,256 bytes allocated
==9466== 
==9466== Searching for pointers to 69,603 not-freed blocks
--9466--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9466--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9466--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9466--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9466--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9466--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9466--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9466--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9466--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9466--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9466--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9466--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9466--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9466--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9466--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9466--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9466--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9466--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9466--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9466--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9466--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9466--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9466--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9466--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9466--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9466--   Scanning root segment: 0x701a000..0x701afff (4096)
--9466--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9466--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9466--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9466--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9466--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9466--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9466--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9466--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9466--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9463== Checked 4,979,568 bytes
==9463== 
==9463== LEAK SUMMARY:
==9463==    definitely lost: 1,533 bytes in 8 blocks
==9463==    indirectly lost: 6,756 bytes in 7 blocks
==9463==      possibly lost: 0 bytes in 0 blocks
==9463==    still reachable: 3,152,145 bytes in 69,096 blocks
==9463==         suppressed: 0 bytes in 0 blocks
==9463== Rerun with --leak-check=full to see details of leaked memory
==9463== 
==9463== Use --track-origins=yes to see where uninitialised values come from
==9463== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== 
==9463== 1 errors in context 1 of 2:
==9463== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9463==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9463==    by 0x488CD0: stringsubst (subst.c:301)
==9463==    by 0x48801B: prefork (subst.c:77)
==9463==    by 0x42B318: execcmd (exec.c:2619)
==9463==    by 0x428CA0: execpline2 (exec.c:1697)
==9463==    by 0x427FD2: execpline (exec.c:1484)
==9463==    by 0x427756: execlist (exec.c:1267)
==9463==    by 0x42717C: execode (exec.c:1073)
==9463==    by 0x431299: runshfunc (exec.c:5040)
==9463==    by 0x430E76: doshfunc (exec.c:4920)
==9463==    by 0x4302FB: execshfunc (exec.c:4557)
==9463==    by 0x42D8C1: execcmd (exec.c:3373)
==9463== 
==9463== 
==9463== 2 errors in context 2 of 2:
==9463== Conditional jump or move depends on uninitialised value(s)
==9463==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9463==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9463==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9463==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9463==    by 0x42D8E9: execcmd (exec.c:3378)
==9463==    by 0x428CA0: execpline2 (exec.c:1697)
==9463==    by 0x427FD2: execpline (exec.c:1484)
==9463==    by 0x42779A: execlist (exec.c:1275)
==9463==    by 0x42717C: execode (exec.c:1073)
==9463==    by 0x431299: runshfunc (exec.c:5040)
==9463==    by 0x430E76: doshfunc (exec.c:4920)
==9463==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9463== 
==9463== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9434-- Caught __NR_exit; running __libc_freeres()
--9434-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9466== Checked 4,891,552 bytes
==9466== 
==9434== 
==9434== HEAP SUMMARY:
==9434==     in use at exit: 3,121,665 bytes in 69,077 blocks
==9434==   total heap usage: 935,610 allocs, 866,533 frees, 66,624,248 bytes allocated
==9434== 
==9466== LEAK SUMMARY:
==9466==    definitely lost: 1,533 bytes in 8 blocks
==9466==    indirectly lost: 6,756 bytes in 7 blocks
==9466==      possibly lost: 0 bytes in 0 blocks
==9466==    still reachable: 3,160,143 bytes in 69,588 blocks
==9466==         suppressed: 0 bytes in 0 blocks
==9466== Rerun with --leak-check=full to see details of leaked memory
==9466== 
==9466== Use --track-origins=yes to see where uninitialised values come from
==9466== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9466== 
==9466== 1 errors in context 1 of 2:
==9466== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9466==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9466==    by 0x488CD0: stringsubst (subst.c:301)
==9466==    by 0x48801B: prefork (subst.c:77)
==9466==    by 0x42B318: execcmd (exec.c:2619)
==9466==    by 0x428CA0: execpline2 (exec.c:1697)
==9466==    by 0x427FD2: execpline (exec.c:1484)
==9466==    by 0x427756: execlist (exec.c:1267)
==9466==    by 0x42717C: execode (exec.c:1073)
==9466==    by 0x431299: runshfunc (exec.c:5040)
==9466==    by 0x430E76: doshfunc (exec.c:4920)
==9466==    by 0x4302FB: execshfunc (exec.c:4557)
==9466==    by 0x42D8C1: execcmd (exec.c:3373)
==9466== 
==9466== 
==9466== 2 errors in context 2 of 2:
==9466== Conditional jump or move depends on uninitialised value(s)
==9466==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9466==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9466==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9466==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9466==    by 0x42D8E9: execcmd (exec.c:3378)
==9466==    by 0x428CA0: execpline2 (exec.c:1697)
==9466==    by 0x427FD2: execpline (exec.c:1484)
==9466==    by 0x42779A: execlist (exec.c:1275)
==9466==    by 0x42717C: execode (exec.c:1073)
==9466==    by 0x431299: runshfunc (exec.c:5040)
==9466==    by 0x430E76: doshfunc (exec.c:4920)
==9466==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9466== 
==9466== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9465-- Caught __NR_exit; running __libc_freeres()
==9434== Searching for pointers to 69,077 not-freed blocks
--9434--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9434--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9434--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9434--   Scanning root segment: 0x4037000..0x403afff (16384)
--9434--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9434--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9434--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9434--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9434--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9434--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9434--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9434--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9434--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9434--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9434--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9434--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9434--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9434--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9434--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9434--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9434--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9434--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9434--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9434--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9434--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9434--   Scanning root segment: 0x701a000..0x701afff (4096)
--9434--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9434--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9434--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9434--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9434--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9434--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9434--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9434--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9434--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9465-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9465== 
==9465== HEAP SUMMARY:
==9465==     in use at exit: 3,168,368 bytes in 69,600 blocks
==9465==   total heap usage: 940,532 allocs, 870,932 frees, 68,301,800 bytes allocated
==9465== 
==9465== Searching for pointers to 69,600 not-freed blocks
--9465--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9465--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9465--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9465--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9465--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9465--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9465--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9465--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9465--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9465--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9465--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9465--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9465--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9465--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9465--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9465--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9465--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9465--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9465--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9465--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9465--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9465--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9465--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9465--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9465--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9465--   Scanning root segment: 0x701a000..0x701afff (4096)
--9465--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9465--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9465--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9465--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9465--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9465--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9465--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9465--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9465--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9434== Checked 4,803,984 bytes
==9434== 
==9434== LEAK SUMMARY:
==9434==    definitely lost: 1,533 bytes in 8 blocks
==9434==    indirectly lost: 6,756 bytes in 7 blocks
==9434==      possibly lost: 0 bytes in 0 blocks
==9434==    still reachable: 3,113,376 bytes in 69,062 blocks
==9434==         suppressed: 0 bytes in 0 blocks
==9434== Rerun with --leak-check=full to see details of leaked memory
==9434== 
==9434== Use --track-origins=yes to see where uninitialised values come from
==9434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9434== 
==9434== 1 errors in context 1 of 2:
==9434== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9434==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9434==    by 0x488CD0: stringsubst (subst.c:301)
==9434==    by 0x48801B: prefork (subst.c:77)
==9434==    by 0x42B318: execcmd (exec.c:2619)
==9434==    by 0x428CA0: execpline2 (exec.c:1697)
==9434==    by 0x427FD2: execpline (exec.c:1484)
==9434==    by 0x427756: execlist (exec.c:1267)
==9434==    by 0x42717C: execode (exec.c:1073)
==9434==    by 0x431299: runshfunc (exec.c:5040)
==9434==    by 0x430E76: doshfunc (exec.c:4920)
==9434==    by 0x4302FB: execshfunc (exec.c:4557)
==9434==    by 0x42D8C1: execcmd (exec.c:3373)
==9434== 
==9434== 
==9434== 2 errors in context 2 of 2:
==9434== Conditional jump or move depends on uninitialised value(s)
==9434==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9434==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9434==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9434==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9434==    by 0x42D8E9: execcmd (exec.c:3378)
==9434==    by 0x428CA0: execpline2 (exec.c:1697)
==9434==    by 0x427FD2: execpline (exec.c:1484)
==9434==    by 0x42779A: execlist (exec.c:1275)
==9434==    by 0x42717C: execode (exec.c:1073)
==9434==    by 0x431299: runshfunc (exec.c:5040)
==9434==    by 0x430E76: doshfunc (exec.c:4920)
==9434==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9434== 
==9434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9465== Checked 4,890,872 bytes
==9465== 
==9465== LEAK SUMMARY:
==9465==    definitely lost: 1,533 bytes in 8 blocks
==9465==    indirectly lost: 6,756 bytes in 7 blocks
==9465==      possibly lost: 0 bytes in 0 blocks
==9465==    still reachable: 3,160,079 bytes in 69,585 blocks
==9465==         suppressed: 0 bytes in 0 blocks
==9465== Rerun with --leak-check=full to see details of leaked memory
==9465== 
==9465== Use --track-origins=yes to see where uninitialised values come from
==9465== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9465== 
==9465== 1 errors in context 1 of 2:
==9465== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9465==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9465==    by 0x488CD0: stringsubst (subst.c:301)
==9465==    by 0x48801B: prefork (subst.c:77)
==9465==    by 0x42B318: execcmd (exec.c:2619)
==9465==    by 0x428CA0: execpline2 (exec.c:1697)
==9465==    by 0x427FD2: execpline (exec.c:1484)
==9465==    by 0x427756: execlist (exec.c:1267)
==9465==    by 0x42717C: execode (exec.c:1073)
==9465==    by 0x431299: runshfunc (exec.c:5040)
==9465==    by 0x430E76: doshfunc (exec.c:4920)
==9465==    by 0x4302FB: execshfunc (exec.c:4557)
==9465==    by 0x42D8C1: execcmd (exec.c:3373)
==9465== 
==9465== 
==9465== 2 errors in context 2 of 2:
==9465== Conditional jump or move depends on uninitialised value(s)
==9465==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9465==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9465==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9465==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9465==    by 0x42D8E9: execcmd (exec.c:3378)
==9465==    by 0x428CA0: execpline2 (exec.c:1697)
==9465==    by 0x427FD2: execpline (exec.c:1484)
==9465==    by 0x42779A: execlist (exec.c:1275)
==9465==    by 0x42717C: execode (exec.c:1073)
==9465==    by 0x431299: runshfunc (exec.c:5040)
==9465==    by 0x430E76: doshfunc (exec.c:4920)
==9465==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9465== 
==9465== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF757C,  len 4
client request: code 4d430005,  addr 0xFFEFF642C,  len 4
client request: code 4d430005,  addr 0xFFEFF933C,  len 4
--9407-- Caught __NR_exit; running __libc_freeres()
--9407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9407== 
==9407== HEAP SUMMARY:
==9407==     in use at exit: 3,146,689 bytes in 69,118 blocks
==9407==   total heap usage: 940,623 allocs, 871,505 frees, 68,318,571 bytes allocated
==9407== 
==9407== Searching for pointers to 69,118 not-freed blocks
--9407--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9407--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9407--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9407--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9407--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9407--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9407--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9407--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9407--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9407--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9407--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9407--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9407--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9407--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9407--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9407--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9407--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9407--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9407--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9407--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9407--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9407--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9407--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9407--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9407--   Scanning root segment: 0x701a000..0x701afff (4096)
--9407--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9407--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9407--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9407--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9407--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9407--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9407--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9407--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9407--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9407== Checked 4,793,040 bytes
==9407== 
==9407== LEAK SUMMARY:
==9407==    definitely lost: 1,533 bytes in 8 blocks
==9407==    indirectly lost: 6,756 bytes in 7 blocks
==9407==      possibly lost: 0 bytes in 0 blocks
==9407==    still reachable: 3,138,400 bytes in 69,103 blocks
==9407==         suppressed: 0 bytes in 0 blocks
==9407== Rerun with --leak-check=full to see details of leaked memory
==9407== 
==9407== Use --track-origins=yes to see where uninitialised values come from
==9407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9407== 
==9407== 1 errors in context 1 of 2:
==9407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9407==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9407==    by 0x488CD0: stringsubst (subst.c:301)
==9407==    by 0x48801B: prefork (subst.c:77)
==9407==    by 0x42B318: execcmd (exec.c:2619)
==9407==    by 0x428CA0: execpline2 (exec.c:1697)
==9407==    by 0x427FD2: execpline (exec.c:1484)
==9407==    by 0x427756: execlist (exec.c:1267)
==9407==    by 0x42717C: execode (exec.c:1073)
==9407==    by 0x431299: runshfunc (exec.c:5040)
==9407==    by 0x430E76: doshfunc (exec.c:4920)
==9407==    by 0x4302FB: execshfunc (exec.c:4557)
==9407==    by 0x42D8C1: execcmd (exec.c:3373)
==9407== 
==9407== 
==9407== 2 errors in context 2 of 2:
==9407== Conditional jump or move depends on uninitialised value(s)
==9407==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9407==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9407==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9407==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9407==    by 0x42D8E9: execcmd (exec.c:3378)
==9407==    by 0x428CA0: execpline2 (exec.c:1697)
==9407==    by 0x427FD2: execpline (exec.c:1484)
==9407==    by 0x42779A: execlist (exec.c:1275)
==9407==    by 0x42717C: execode (exec.c:1073)
==9407==    by 0x431299: runshfunc (exec.c:5040)
==9407==    by 0x430E76: doshfunc (exec.c:4920)
==9407==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9407== 
==9407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9400-- Caught __NR_exit; running __libc_freeres()
--9400-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9400== 
==9400== HEAP SUMMARY:
==9400==     in use at exit: 3,116,601 bytes in 68,889 blocks
==9400==   total heap usage: 935,507 allocs, 866,618 frees, 66,585,332 bytes allocated
==9400== 
==9400== Searching for pointers to 68,889 not-freed blocks
--9400--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9400--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9400--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9400--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9400--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9400--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9400--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9400--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9400--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9400--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9400--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9400--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9400--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9400--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9400--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9400--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9400--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9400--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9400--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9400--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9400--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9400--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9400--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9400--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9400--   Scanning root segment: 0x701a000..0x701afff (4096)
--9400--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9400--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9400--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9400--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9400--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9400--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9400--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9400--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9400--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9400== Checked 4,761,832 bytes
==9400== 
==9400== LEAK SUMMARY:
==9400==    definitely lost: 1,533 bytes in 8 blocks
==9400==    indirectly lost: 6,756 bytes in 7 blocks
==9400==      possibly lost: 0 bytes in 0 blocks
==9400==    still reachable: 3,108,312 bytes in 68,874 blocks
==9400==         suppressed: 0 bytes in 0 blocks
==9400== Rerun with --leak-check=full to see details of leaked memory
==9400== 
==9400== Use --track-origins=yes to see where uninitialised values come from
==9400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9400== 
==9400== 1 errors in context 1 of 2:
==9400== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9400==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9400==    by 0x488CD0: stringsubst (subst.c:301)
==9400==    by 0x48801B: prefork (subst.c:77)
==9400==    by 0x42B318: execcmd (exec.c:2619)
==9400==    by 0x428CA0: execpline2 (exec.c:1697)
==9400==    by 0x427FD2: execpline (exec.c:1484)
==9400==    by 0x427756: execlist (exec.c:1267)
==9400==    by 0x42717C: execode (exec.c:1073)
==9400==    by 0x431299: runshfunc (exec.c:5040)
==9400==    by 0x430E76: doshfunc (exec.c:4920)
==9400==    by 0x4302FB: execshfunc (exec.c:4557)
==9400==    by 0x42D8C1: execcmd (exec.c:3373)
==9400== 
==9400== 
==9400== 2 errors in context 2 of 2:
==9400== Conditional jump or move depends on uninitialised value(s)
==9400==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9400==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9400==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9400==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9400==    by 0x42D8E9: execcmd (exec.c:3378)
==9400==    by 0x428CA0: execpline2 (exec.c:1697)
==9400==    by 0x427FD2: execpline (exec.c:1484)
==9400==    by 0x42779A: execlist (exec.c:1275)
==9400==    by 0x42717C: execode (exec.c:1073)
==9400==    by 0x431299: runshfunc (exec.c:5040)
==9400==    by 0x430E76: doshfunc (exec.c:4920)
==9400==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9400== 
==9400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9469-- Caught __NR_exit; running __libc_freeres()
==9469== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9469-by-pythonnut-on-???
==9469== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9469-by-pythonnut-on-???
==9469== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9469-by-pythonnut-on-???
==9469== 
==9469== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9469== don't want to do, unless you know exactly what you're doing,
==9469== or are doing some strange experiment):
==9469==   /usr/lib/valgrind/../../bin/vgdb --pid=9469 ...command...
==9469== 
==9469== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9469==   /path/to/gdb ./zsh
==9469== and then give GDB the following command
==9469==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9469
==9469== --pid is optional if only one valgrind process is running
==9469== 
==9470== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9470-by-pythonnut-on-???
==9470== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9470-by-pythonnut-on-???
==9470== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9470-by-pythonnut-on-???
==9470== 
==9470== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9470== don't want to do, unless you know exactly what you're doing,
==9470== or are doing some strange experiment):
==9470==   /usr/lib/valgrind/../../bin/vgdb --pid=9470 ...command...
==9470== 
==9470== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9470==   /path/to/gdb ./zsh
==9470== and then give GDB the following command
==9470==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9470
==9470== --pid is optional if only one valgrind process is running
==9470== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9469-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9469== 
==9469== HEAP SUMMARY:
==9469==     in use at exit: 3,118,245 bytes in 68,941 blocks
==9469==   total heap usage: 935,566 allocs, 866,625 frees, 66,590,100 bytes allocated
==9469== 
==9469== Searching for pointers to 68,941 not-freed blocks
--9469--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9469--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9469--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9469--   Scanning root segment: 0x4037000..0x403afff (16384)
--9469--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9469--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9469--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9469--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9469--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9469--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9469--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9469--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9469--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9469--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9469--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9469--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9469--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9469--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9469--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9469--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9469--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9469--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9469--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9469--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9469--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9469--   Scanning root segment: 0x701a000..0x701afff (4096)
--9469--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9469--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9469--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9469--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9469--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9469--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9469--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9469--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9469--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9469== Checked 4,780,400 bytes
==9469== 
==9469== LEAK SUMMARY:
==9469==    definitely lost: 1,533 bytes in 8 blocks
==9469==    indirectly lost: 6,756 bytes in 7 blocks
==9469==      possibly lost: 0 bytes in 0 blocks
==9469==    still reachable: 3,109,956 bytes in 68,926 blocks
==9469==         suppressed: 0 bytes in 0 blocks
==9469== Rerun with --leak-check=full to see details of leaked memory
==9469== 
==9469== Use --track-origins=yes to see where uninitialised values come from
==9469== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9469== 
==9469== 1 errors in context 1 of 2:
==9469== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9469==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9469==    by 0x488CD0: stringsubst (subst.c:301)
==9469==    by 0x48801B: prefork (subst.c:77)
==9469==    by 0x42B318: execcmd (exec.c:2619)
==9469==    by 0x428CA0: execpline2 (exec.c:1697)
==9469==    by 0x427FD2: execpline (exec.c:1484)
==9469==    by 0x427756: execlist (exec.c:1267)
==9469==    by 0x42717C: execode (exec.c:1073)
==9469==    by 0x431299: runshfunc (exec.c:5040)
==9469==    by 0x430E76: doshfunc (exec.c:4920)
==9469==    by 0x4302FB: execshfunc (exec.c:4557)
==9469==    by 0x42D8C1: execcmd (exec.c:3373)
==9469== 
==9469== 
==9469== 2 errors in context 2 of 2:
==9469== Conditional jump or move depends on uninitialised value(s)
==9469==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9469==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9469==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9469==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9469==    by 0x42D8E9: execcmd (exec.c:3378)
==9469==    by 0x428CA0: execpline2 (exec.c:1697)
==9469==    by 0x427FD2: execpline (exec.c:1484)
==9469==    by 0x42779A: execlist (exec.c:1275)
==9469==    by 0x42717C: execode (exec.c:1073)
==9469==    by 0x431299: runshfunc (exec.c:5040)
==9469==    by 0x430E76: doshfunc (exec.c:4920)
==9469==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9469== 
==9469== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9468== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9468-by-pythonnut-on-???
==9468== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9468-by-pythonnut-on-???
==9468== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9468-by-pythonnut-on-???
==9468== 
==9468== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9468== don't want to do, unless you know exactly what you're doing,
==9468== or are doing some strange experiment):
==9468==   /usr/lib/valgrind/../../bin/vgdb --pid=9468 ...command...
==9468== 
==9468== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9468==   /path/to/gdb ./zsh
==9468== and then give GDB the following command
==9468==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9468
==9468== --pid is optional if only one valgrind process is running
==9468== 
--9468-- Caught __NR_exit; running __libc_freeres()
--9468-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9468== 
==9468== HEAP SUMMARY:
==9468==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9468==   total heap usage: 935,568 allocs, 866,630 frees, 66,590,644 bytes allocated
==9468== 
==9468== Searching for pointers to 68,938 not-freed blocks
--9468--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9468--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9468--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9468--   Scanning root segment: 0x4037000..0x403afff (16384)
--9468--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9468--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9468--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9468--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9468--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9468--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9468--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9468--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9468--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9468--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9468--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9468--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9468--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9468--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9468--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9468--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9468--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9468--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9468--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9468--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9468--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9468--   Scanning root segment: 0x701a000..0x701afff (4096)
--9468--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9468--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9468--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9468--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9468--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9468--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9468--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9468--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9468--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9468== Checked 4,779,712 bytes
==9468== 
==9468== LEAK SUMMARY:
==9468==    definitely lost: 1,533 bytes in 8 blocks
==9468==    indirectly lost: 6,756 bytes in 7 blocks
==9468==      possibly lost: 0 bytes in 0 blocks
==9468==    still reachable: 3,109,892 bytes in 68,923 blocks
==9468==         suppressed: 0 bytes in 0 blocks
==9468== Rerun with --leak-check=full to see details of leaked memory
==9468== 
==9468== Use --track-origins=yes to see where uninitialised values come from
==9468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9468== 
==9468== 1 errors in context 1 of 2:
==9468== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9468==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9468==    by 0x488CD0: stringsubst (subst.c:301)
==9468==    by 0x48801B: prefork (subst.c:77)
==9468==    by 0x42B318: execcmd (exec.c:2619)
==9468==    by 0x428CA0: execpline2 (exec.c:1697)
==9468==    by 0x427FD2: execpline (exec.c:1484)
==9468==    by 0x427756: execlist (exec.c:1267)
==9468==    by 0x42717C: execode (exec.c:1073)
==9468==    by 0x431299: runshfunc (exec.c:5040)
==9468==    by 0x430E76: doshfunc (exec.c:4920)
==9468==    by 0x4302FB: execshfunc (exec.c:4557)
==9468==    by 0x42D8C1: execcmd (exec.c:3373)
==9468== 
==9468== 
==9468== 2 errors in context 2 of 2:
==9468== Conditional jump or move depends on uninitialised value(s)
==9468==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9468==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9468==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9468==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9468==    by 0x42D8E9: execcmd (exec.c:3378)
==9468==    by 0x428CA0: execpline2 (exec.c:1697)
==9468==    by 0x427FD2: execpline (exec.c:1484)
==9468==    by 0x42779A: execlist (exec.c:1275)
==9468==    by 0x42717C: execode (exec.c:1073)
==9468==    by 0x431299: runshfunc (exec.c:5040)
==9468==    by 0x430E76: doshfunc (exec.c:4920)
==9468==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9468== 
==9468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9473== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9473-by-pythonnut-on-???
==9473== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9473-by-pythonnut-on-???
==9473== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9473-by-pythonnut-on-???
==9473== 
==9473== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9473== don't want to do, unless you know exactly what you're doing,
==9473== or are doing some strange experiment):
==9473==   /usr/lib/valgrind/../../bin/vgdb --pid=9473 ...command...
==9473== 
==9473== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9473==   /path/to/gdb ./zsh
==9473== and then give GDB the following command
==9473==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9473
==9473== --pid is optional if only one valgrind process is running
==9473== 
--9473-- Caught __NR_exit; running __libc_freeres()
--9473-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9473== 
==9473== HEAP SUMMARY:
==9473==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9473==   total heap usage: 935,583 allocs, 866,645 frees, 66,595,628 bytes allocated
==9473== 
==9473== Searching for pointers to 68,938 not-freed blocks
--9473--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9473--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9473--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9473--   Scanning root segment: 0x4037000..0x403afff (16384)
--9473--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9473--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9473--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9473--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9473--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9473--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9473--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9473--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9473--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9473--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9473--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9473--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9473--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9473--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9473--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9473--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9473--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9473--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9473--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9473--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9473--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9473--   Scanning root segment: 0x701a000..0x701afff (4096)
--9473--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9473--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9473--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9473--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9473--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9473--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9473--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9473--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9473--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9473== Checked 4,779,712 bytes
==9473== 
==9473== LEAK SUMMARY:
==9473==    definitely lost: 1,533 bytes in 8 blocks
==9473==    indirectly lost: 6,756 bytes in 7 blocks
==9473==      possibly lost: 0 bytes in 0 blocks
==9473==    still reachable: 3,109,892 bytes in 68,923 blocks
==9473==         suppressed: 0 bytes in 0 blocks
==9473== Rerun with --leak-check=full to see details of leaked memory
==9473== 
==9473== Use --track-origins=yes to see where uninitialised values come from
==9473== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9473== 
==9473== 1 errors in context 1 of 2:
==9473== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9473==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9473==    by 0x488CD0: stringsubst (subst.c:301)
==9473==    by 0x48801B: prefork (subst.c:77)
==9473==    by 0x42B318: execcmd (exec.c:2619)
==9473==    by 0x428CA0: execpline2 (exec.c:1697)
==9473==    by 0x427FD2: execpline (exec.c:1484)
==9473==    by 0x427756: execlist (exec.c:1267)
==9473==    by 0x42717C: execode (exec.c:1073)
==9473==    by 0x431299: runshfunc (exec.c:5040)
==9473==    by 0x430E76: doshfunc (exec.c:4920)
==9473==    by 0x4302FB: execshfunc (exec.c:4557)
==9473==    by 0x42D8C1: execcmd (exec.c:3373)
==9473== 
==9473== 
==9473== 2 errors in context 2 of 2:
==9473== Conditional jump or move depends on uninitialised value(s)
==9473==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9473==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9473==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9473==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9473==    by 0x42D8E9: execcmd (exec.c:3378)
==9473==    by 0x428CA0: execpline2 (exec.c:1697)
==9473==    by 0x427FD2: execpline (exec.c:1484)
==9473==    by 0x42779A: execlist (exec.c:1275)
==9473==    by 0x42717C: execode (exec.c:1073)
==9473==    by 0x431299: runshfunc (exec.c:5040)
==9473==    by 0x430E76: doshfunc (exec.c:4920)
==9473==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9473== 
==9473== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9474== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9474-by-pythonnut-on-???
==9474== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9474-by-pythonnut-on-???
==9474== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9474-by-pythonnut-on-???
==9474== 
==9474== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9474== don't want to do, unless you know exactly what you're doing,
==9474== or are doing some strange experiment):
==9474==   /usr/lib/valgrind/../../bin/vgdb --pid=9474 ...command...
==9474== 
==9474== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9474==   /path/to/gdb ./zsh
==9474== and then give GDB the following command
==9474==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9474
==9474== --pid is optional if only one valgrind process is running
==9474== 
--9474-- Caught __NR_exit; running __libc_freeres()
--9474-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9474== 
==9474== HEAP SUMMARY:
==9474==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9474==   total heap usage: 935,588 allocs, 866,650 frees, 66,597,741 bytes allocated
==9474== 
==9474== Searching for pointers to 68,938 not-freed blocks
--9474--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9474--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9474--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9474--   Scanning root segment: 0x4037000..0x403afff (16384)
--9474--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9474--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9474--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9474--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9474--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9474--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9474--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9474--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9474--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9474--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9474--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9474--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9474--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9474--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9474--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9474--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9474--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9474--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9474--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9474--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9474--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9474--   Scanning root segment: 0x701a000..0x701afff (4096)
--9474--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9474--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9474--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9474--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9474--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9474--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9474--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9474--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9474--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9474== Checked 4,779,712 bytes
==9474== 
==9474== LEAK SUMMARY:
==9474==    definitely lost: 1,533 bytes in 8 blocks
==9474==    indirectly lost: 6,756 bytes in 7 blocks
==9474==      possibly lost: 0 bytes in 0 blocks
==9474==    still reachable: 3,109,892 bytes in 68,923 blocks
==9474==         suppressed: 0 bytes in 0 blocks
==9474== Rerun with --leak-check=full to see details of leaked memory
==9474== 
==9474== Use --track-origins=yes to see where uninitialised values come from
==9474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9474== 
==9474== 1 errors in context 1 of 2:
==9474== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9474==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9474==    by 0x488CD0: stringsubst (subst.c:301)
==9474==    by 0x48801B: prefork (subst.c:77)
==9474==    by 0x42B318: execcmd (exec.c:2619)
==9474==    by 0x428CA0: execpline2 (exec.c:1697)
==9474==    by 0x427FD2: execpline (exec.c:1484)
==9474==    by 0x427756: execlist (exec.c:1267)
==9474==    by 0x42717C: execode (exec.c:1073)
==9474==    by 0x431299: runshfunc (exec.c:5040)
==9474==    by 0x430E76: doshfunc (exec.c:4920)
==9474==    by 0x4302FB: execshfunc (exec.c:4557)
==9474==    by 0x42D8C1: execcmd (exec.c:3373)
==9474== 
==9474== 
==9474== 2 errors in context 2 of 2:
==9474== Conditional jump or move depends on uninitialised value(s)
==9474==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9474==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9474==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9474==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9474==    by 0x42D8E9: execcmd (exec.c:3378)
==9474==    by 0x428CA0: execpline2 (exec.c:1697)
==9474==    by 0x427FD2: execpline (exec.c:1484)
==9474==    by 0x42779A: execlist (exec.c:1275)
==9474==    by 0x42717C: execode (exec.c:1073)
==9474==    by 0x431299: runshfunc (exec.c:5040)
==9474==    by 0x430E76: doshfunc (exec.c:4920)
==9474==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9474== 
==9474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9475-- Caught __NR_exit; running __libc_freeres()
==9475== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9475-by-pythonnut-on-???
==9475== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9475-by-pythonnut-on-???
==9475== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9475-by-pythonnut-on-???
==9475== 
==9475== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9475== don't want to do, unless you know exactly what you're doing,
==9475== or are doing some strange experiment):
==9475==   /usr/lib/valgrind/../../bin/vgdb --pid=9475 ...command...
==9475== 
==9475== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9475==   /path/to/gdb ./zsh
==9475== and then give GDB the following command
==9475==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9475
==9475== --pid is optional if only one valgrind process is running
==9475== 
--9475-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9475== 
==9475== HEAP SUMMARY:
==9475==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9475==   total heap usage: 935,593 allocs, 866,655 frees, 66,599,854 bytes allocated
==9475== 
==9475== Searching for pointers to 68,938 not-freed blocks
--9475--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9475--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9475--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9475--   Scanning root segment: 0x4037000..0x403afff (16384)
--9475--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9475--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9475--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9475--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9475--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9475--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9475--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9475--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9475--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9475--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9475--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9475--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9475--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9475--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9475--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9475--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9475--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9475--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9475--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9475--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9475--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9475--   Scanning root segment: 0x701a000..0x701afff (4096)
--9475--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9475--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9475--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9475--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9475--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9475--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9475--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9475--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9475--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9475== Checked 4,779,712 bytes
==9475== 
==9475== LEAK SUMMARY:
==9475==    definitely lost: 1,533 bytes in 8 blocks
==9475==    indirectly lost: 6,756 bytes in 7 blocks
==9475==      possibly lost: 0 bytes in 0 blocks
==9475==    still reachable: 3,109,892 bytes in 68,923 blocks
==9475==         suppressed: 0 bytes in 0 blocks
==9475== Rerun with --leak-check=full to see details of leaked memory
==9475== 
==9475== Use --track-origins=yes to see where uninitialised values come from
==9475== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9475== 
==9475== 1 errors in context 1 of 2:
==9475== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9475==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9475==    by 0x488CD0: stringsubst (subst.c:301)
==9475==    by 0x48801B: prefork (subst.c:77)
==9475==    by 0x42B318: execcmd (exec.c:2619)
==9475==    by 0x428CA0: execpline2 (exec.c:1697)
==9475==    by 0x427FD2: execpline (exec.c:1484)
==9475==    by 0x427756: execlist (exec.c:1267)
==9475==    by 0x42717C: execode (exec.c:1073)
==9475==    by 0x431299: runshfunc (exec.c:5040)
==9475==    by 0x430E76: doshfunc (exec.c:4920)
==9475==    by 0x4302FB: execshfunc (exec.c:4557)
==9475==    by 0x42D8C1: execcmd (exec.c:3373)
==9475== 
==9475== 
==9475== 2 errors in context 2 of 2:
==9475== Conditional jump or move depends on uninitialised value(s)
==9475==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9475==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9475==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9475==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9475==    by 0x42D8E9: execcmd (exec.c:3378)
==9475==    by 0x428CA0: execpline2 (exec.c:1697)
==9475==    by 0x427FD2: execpline (exec.c:1484)
==9475==    by 0x42779A: execlist (exec.c:1275)
==9475==    by 0x42717C: execode (exec.c:1073)
==9475==    by 0x431299: runshfunc (exec.c:5040)
==9475==    by 0x430E76: doshfunc (exec.c:4920)
==9475==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9475== 
==9475== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9476== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9476-by-pythonnut-on-???
==9476== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9476-by-pythonnut-on-???
==9476== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9476-by-pythonnut-on-???
==9476== 
==9476== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9476== don't want to do, unless you know exactly what you're doing,
==9476== or are doing some strange experiment):
==9476==   /usr/lib/valgrind/../../bin/vgdb --pid=9476 ...command...
==9476== 
==9476== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9476==   /path/to/gdb ./zsh
==9476== and then give GDB the following command
==9476==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9476
==9476== --pid is optional if only one valgrind process is running
==9476== 
--9476-- Caught __NR_exit; running __libc_freeres()
--9476-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9476== 
==9476== HEAP SUMMARY:
==9476==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9476==   total heap usage: 935,598 allocs, 866,660 frees, 66,601,967 bytes allocated
==9476== 
==9476== Searching for pointers to 68,938 not-freed blocks
--9476--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9476--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9476--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9476--   Scanning root segment: 0x4037000..0x403afff (16384)
--9476--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9476--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9476--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9476--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9476--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9476--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9476--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9476--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9476--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9476--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9476--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9476--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9476--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9476--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9476--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9476--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9476--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9476--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9476--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9476--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9476--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9476--   Scanning root segment: 0x701a000..0x701afff (4096)
--9476--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9476--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9476--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9476--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9476--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9476--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9476--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9476--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9476--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9476== Checked 4,779,712 bytes
==9476== 
==9476== LEAK SUMMARY:
==9476==    definitely lost: 1,533 bytes in 8 blocks
==9476==    indirectly lost: 6,756 bytes in 7 blocks
==9476==      possibly lost: 0 bytes in 0 blocks
==9476==    still reachable: 3,109,892 bytes in 68,923 blocks
==9476==         suppressed: 0 bytes in 0 blocks
==9476== Rerun with --leak-check=full to see details of leaked memory
==9476== 
==9476== Use --track-origins=yes to see where uninitialised values come from
==9476== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9476== 
==9476== 1 errors in context 1 of 2:
==9476== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9476==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9476==    by 0x488CD0: stringsubst (subst.c:301)
==9476==    by 0x48801B: prefork (subst.c:77)
==9476==    by 0x42B318: execcmd (exec.c:2619)
==9476==    by 0x428CA0: execpline2 (exec.c:1697)
==9476==    by 0x427FD2: execpline (exec.c:1484)
==9476==    by 0x427756: execlist (exec.c:1267)
==9476==    by 0x42717C: execode (exec.c:1073)
==9476==    by 0x431299: runshfunc (exec.c:5040)
==9476==    by 0x430E76: doshfunc (exec.c:4920)
==9476==    by 0x4302FB: execshfunc (exec.c:4557)
==9476==    by 0x42D8C1: execcmd (exec.c:3373)
==9476== 
==9476== 
==9476== 2 errors in context 2 of 2:
==9476== Conditional jump or move depends on uninitialised value(s)
==9476==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9476==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9476==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9476==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9476==    by 0x42D8E9: execcmd (exec.c:3378)
==9476==    by 0x428CA0: execpline2 (exec.c:1697)
==9476==    by 0x427FD2: execpline (exec.c:1484)
==9476==    by 0x42779A: execlist (exec.c:1275)
==9476==    by 0x42717C: execode (exec.c:1073)
==9476==    by 0x431299: runshfunc (exec.c:5040)
==9476==    by 0x430E76: doshfunc (exec.c:4920)
==9476==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9476== 
==9476== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9477== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9477-by-pythonnut-on-???
==9477== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9477-by-pythonnut-on-???
==9477== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9477-by-pythonnut-on-???
==9477== 
==9477== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9477== don't want to do, unless you know exactly what you're doing,
==9477== or are doing some strange experiment):
==9477==   /usr/lib/valgrind/../../bin/vgdb --pid=9477 ...command...
==9477== 
==9477== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9477==   /path/to/gdb ./zsh
==9477== and then give GDB the following command
==9477==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9477
==9477== --pid is optional if only one valgrind process is running
==9477== 
--9477-- Caught __NR_exit; running __libc_freeres()
--9477-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9477== 
==9477== HEAP SUMMARY:
==9477==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9477==   total heap usage: 935,603 allocs, 866,665 frees, 66,604,080 bytes allocated
==9477== 
==9477== Searching for pointers to 68,938 not-freed blocks
--9477--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9477--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9477--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9477--   Scanning root segment: 0x4037000..0x403afff (16384)
--9477--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9477--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9477--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9477--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9477--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9477--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9477--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9477--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9477--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9477--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9477--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9477--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9477--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9477--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9477--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9477--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9477--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9477--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9477--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9477--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9477--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9477--   Scanning root segment: 0x701a000..0x701afff (4096)
--9477--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9477--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9477--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9477--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9477--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9477--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9477--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9477--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9477--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9477== Checked 4,779,712 bytes
==9477== 
==9477== LEAK SUMMARY:
==9477==    definitely lost: 1,533 bytes in 8 blocks
==9477==    indirectly lost: 6,756 bytes in 7 blocks
==9477==      possibly lost: 0 bytes in 0 blocks
==9477==    still reachable: 3,109,892 bytes in 68,923 blocks
==9477==         suppressed: 0 bytes in 0 blocks
==9477== Rerun with --leak-check=full to see details of leaked memory
==9477== 
==9477== Use --track-origins=yes to see where uninitialised values come from
==9477== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9477== 
==9477== 1 errors in context 1 of 2:
==9477== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9477==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9477==    by 0x488CD0: stringsubst (subst.c:301)
==9477==    by 0x48801B: prefork (subst.c:77)
==9477==    by 0x42B318: execcmd (exec.c:2619)
==9477==    by 0x428CA0: execpline2 (exec.c:1697)
==9477==    by 0x427FD2: execpline (exec.c:1484)
==9477==    by 0x427756: execlist (exec.c:1267)
==9477==    by 0x42717C: execode (exec.c:1073)
==9477==    by 0x431299: runshfunc (exec.c:5040)
==9477==    by 0x430E76: doshfunc (exec.c:4920)
==9477==    by 0x4302FB: execshfunc (exec.c:4557)
==9477==    by 0x42D8C1: execcmd (exec.c:3373)
==9477== 
==9477== 
==9477== 2 errors in context 2 of 2:
==9477== Conditional jump or move depends on uninitialised value(s)
==9477==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9477==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9477==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9477==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9477==    by 0x42D8E9: execcmd (exec.c:3378)
==9477==    by 0x428CA0: execpline2 (exec.c:1697)
==9477==    by 0x427FD2: execpline (exec.c:1484)
==9477==    by 0x42779A: execlist (exec.c:1275)
==9477==    by 0x42717C: execode (exec.c:1073)
==9477==    by 0x431299: runshfunc (exec.c:5040)
==9477==    by 0x430E76: doshfunc (exec.c:4920)
==9477==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9477== 
==9477== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9480== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9480-by-pythonnut-on-???
==9480== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9480-by-pythonnut-on-???
==9480== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9480-by-pythonnut-on-???
==9480== 
==9480== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9480== don't want to do, unless you know exactly what you're doing,
==9480== or are doing some strange experiment):
==9480==   /usr/lib/valgrind/../../bin/vgdb --pid=9480 ...command...
==9480== 
==9480== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9480==   /path/to/gdb ./zsh
==9480== and then give GDB the following command
==9480==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9480
==9480== --pid is optional if only one valgrind process is running
==9480== 
--9480-- Caught __NR_exit; running __libc_freeres()
--9480-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9480== 
==9480== HEAP SUMMARY:
==9480==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9480==   total heap usage: 935,608 allocs, 866,670 frees, 66,606,189 bytes allocated
==9480== 
==9480== Searching for pointers to 68,938 not-freed blocks
--9480--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9480--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9480--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9480--   Scanning root segment: 0x4037000..0x403afff (16384)
--9480--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9480--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9480--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9480--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9480--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9480--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9480--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9480--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9480--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9480--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9480--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9480--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9480--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9480--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9480--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9480--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9480--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9480--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9480--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9480--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9480--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9480--   Scanning root segment: 0x701a000..0x701afff (4096)
--9480--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9480--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9480--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9480--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9480--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9480--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9480--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9480--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9480--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9480== Checked 4,779,712 bytes
==9480== 
==9480== LEAK SUMMARY:
==9480==    definitely lost: 1,533 bytes in 8 blocks
==9480==    indirectly lost: 6,756 bytes in 7 blocks
==9480==      possibly lost: 0 bytes in 0 blocks
==9480==    still reachable: 3,109,892 bytes in 68,923 blocks
==9480==         suppressed: 0 bytes in 0 blocks
==9480== Rerun with --leak-check=full to see details of leaked memory
==9480== 
==9480== Use --track-origins=yes to see where uninitialised values come from
==9480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9480== 
==9480== 1 errors in context 1 of 2:
==9480== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9480==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9480==    by 0x488CD0: stringsubst (subst.c:301)
==9480==    by 0x48801B: prefork (subst.c:77)
==9480==    by 0x42B318: execcmd (exec.c:2619)
==9480==    by 0x428CA0: execpline2 (exec.c:1697)
==9480==    by 0x427FD2: execpline (exec.c:1484)
==9480==    by 0x427756: execlist (exec.c:1267)
==9480==    by 0x42717C: execode (exec.c:1073)
==9480==    by 0x431299: runshfunc (exec.c:5040)
==9480==    by 0x430E76: doshfunc (exec.c:4920)
==9480==    by 0x4302FB: execshfunc (exec.c:4557)
==9480==    by 0x42D8C1: execcmd (exec.c:3373)
==9480== 
==9480== 
==9480== 2 errors in context 2 of 2:
==9480== Conditional jump or move depends on uninitialised value(s)
==9480==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9480==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9480==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9480==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9480==    by 0x42D8E9: execcmd (exec.c:3378)
==9480==    by 0x428CA0: execpline2 (exec.c:1697)
==9480==    by 0x427FD2: execpline (exec.c:1484)
==9480==    by 0x42779A: execlist (exec.c:1275)
==9480==    by 0x42717C: execode (exec.c:1073)
==9480==    by 0x431299: runshfunc (exec.c:5040)
==9480==    by 0x430E76: doshfunc (exec.c:4920)
==9480==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9480== 
==9480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9481== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9481-by-pythonnut-on-???
==9481== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9481-by-pythonnut-on-???
==9481== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9481-by-pythonnut-on-???
==9481== 
==9481== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9481== don't want to do, unless you know exactly what you're doing,
==9481== or are doing some strange experiment):
==9481==   /usr/lib/valgrind/../../bin/vgdb --pid=9481 ...command...
==9481== 
==9481== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9481==   /path/to/gdb ./zsh
==9481== and then give GDB the following command
==9481==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9481
==9481== --pid is optional if only one valgrind process is running
==9481== 
--9481-- Caught __NR_exit; running __libc_freeres()
--9481-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9481== 
==9481== HEAP SUMMARY:
==9481==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9481==   total heap usage: 935,613 allocs, 866,675 frees, 66,608,306 bytes allocated
==9481== 
==9481== Searching for pointers to 68,938 not-freed blocks
--9481--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9481--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9481--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9481--   Scanning root segment: 0x4037000..0x403afff (16384)
--9481--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9481--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9481--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9481--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9481--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9481--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9481--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9481--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9481--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9481--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9481--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9481--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9481--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9481--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9481--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9481--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9481--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9481--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9481--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9481--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9481--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9481--   Scanning root segment: 0x701a000..0x701afff (4096)
--9481--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9481--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9481--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9481--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9481--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9481--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9481--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9481--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9481--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9481== Checked 4,779,712 bytes
==9481== 
==9481== LEAK SUMMARY:
==9481==    definitely lost: 1,533 bytes in 8 blocks
==9481==    indirectly lost: 6,756 bytes in 7 blocks
==9481==      possibly lost: 0 bytes in 0 blocks
==9481==    still reachable: 3,109,892 bytes in 68,923 blocks
==9481==         suppressed: 0 bytes in 0 blocks
==9481== Rerun with --leak-check=full to see details of leaked memory
==9481== 
==9481== Use --track-origins=yes to see where uninitialised values come from
==9481== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9481== 
==9481== 1 errors in context 1 of 2:
==9481== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9481==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9481==    by 0x488CD0: stringsubst (subst.c:301)
==9481==    by 0x48801B: prefork (subst.c:77)
==9481==    by 0x42B318: execcmd (exec.c:2619)
==9481==    by 0x428CA0: execpline2 (exec.c:1697)
==9481==    by 0x427FD2: execpline (exec.c:1484)
==9481==    by 0x427756: execlist (exec.c:1267)
==9481==    by 0x42717C: execode (exec.c:1073)
==9481==    by 0x431299: runshfunc (exec.c:5040)
==9481==    by 0x430E76: doshfunc (exec.c:4920)
==9481==    by 0x4302FB: execshfunc (exec.c:4557)
==9481==    by 0x42D8C1: execcmd (exec.c:3373)
==9481== 
==9481== 
==9481== 2 errors in context 2 of 2:
==9481== Conditional jump or move depends on uninitialised value(s)
==9481==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9481==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9481==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9481==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9481==    by 0x42D8E9: execcmd (exec.c:3378)
==9481==    by 0x428CA0: execpline2 (exec.c:1697)
==9481==    by 0x427FD2: execpline (exec.c:1484)
==9481==    by 0x42779A: execlist (exec.c:1275)
==9481==    by 0x42717C: execode (exec.c:1073)
==9481==    by 0x431299: runshfunc (exec.c:5040)
==9481==    by 0x430E76: doshfunc (exec.c:4920)
==9481==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9481== 
==9481== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9483-- Caught __NR_exit; running __libc_freeres()
==9484== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9484-by-pythonnut-on-???
==9484== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9484-by-pythonnut-on-???
==9484== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9484-by-pythonnut-on-???
==9484== 
==9484== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9484== don't want to do, unless you know exactly what you're doing,
==9484== or are doing some strange experiment):
==9484==   /usr/lib/valgrind/../../bin/vgdb --pid=9484 ...command...
==9484== 
==9484== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9484==   /path/to/gdb ./zsh
==9484== and then give GDB the following command
==9484==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9484
==9484== --pid is optional if only one valgrind process is running
==9484== 
==9483== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9483-by-pythonnut-on-???
==9483== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9483-by-pythonnut-on-???
==9483== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9483-by-pythonnut-on-???
==9483== 
==9483== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9483== don't want to do, unless you know exactly what you're doing,
==9483== or are doing some strange experiment):
==9483==   /usr/lib/valgrind/../../bin/vgdb --pid=9483 ...command...
==9483== 
==9483== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9483==   /path/to/gdb ./zsh
==9483== and then give GDB the following command
==9483==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9483
==9483== --pid is optional if only one valgrind process is running
==9483== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9483-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9483== 
==9483== HEAP SUMMARY:
==9483==     in use at exit: 3,118,337 bytes in 68,943 blocks
==9483==   total heap usage: 935,617 allocs, 866,674 frees, 66,611,728 bytes allocated
==9483== 
==9483== Searching for pointers to 68,943 not-freed blocks
--9483--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9483--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9483--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9483--   Scanning root segment: 0x4037000..0x403afff (16384)
--9483--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9483--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9483--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9483--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9483--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9483--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9483--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9483--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9483--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9483--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9483--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9483--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9483--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9483--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9483--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9483--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9483--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9483--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9483--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9483--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9483--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9483--   Scanning root segment: 0x701a000..0x701afff (4096)
--9483--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9483--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9483--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9483--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9483--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9483--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9483--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9483--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9483--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9483== Checked 4,780,488 bytes
==9483== 
==9483== LEAK SUMMARY:
==9483==    definitely lost: 1,533 bytes in 8 blocks
==9483==    indirectly lost: 6,756 bytes in 7 blocks
==9483==      possibly lost: 0 bytes in 0 blocks
==9483==    still reachable: 3,110,048 bytes in 68,928 blocks
==9483==         suppressed: 0 bytes in 0 blocks
==9483== Rerun with --leak-check=full to see details of leaked memory
==9483== 
==9483== Use --track-origins=yes to see where uninitialised values come from
==9483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9483== 
==9483== 1 errors in context 1 of 2:
==9483== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9483==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9483==    by 0x488CD0: stringsubst (subst.c:301)
==9483==    by 0x48801B: prefork (subst.c:77)
==9483==    by 0x42B318: execcmd (exec.c:2619)
==9483==    by 0x428CA0: execpline2 (exec.c:1697)
==9483==    by 0x427FD2: execpline (exec.c:1484)
==9483==    by 0x427756: execlist (exec.c:1267)
==9483==    by 0x42717C: execode (exec.c:1073)
==9483==    by 0x431299: runshfunc (exec.c:5040)
==9483==    by 0x430E76: doshfunc (exec.c:4920)
==9483==    by 0x4302FB: execshfunc (exec.c:4557)
==9483==    by 0x42D8C1: execcmd (exec.c:3373)
==9483== 
==9483== 
==9483== 2 errors in context 2 of 2:
==9483== Conditional jump or move depends on uninitialised value(s)
==9483==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9483==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9483==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9483==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9483==    by 0x42D8E9: execcmd (exec.c:3378)
==9483==    by 0x428CA0: execpline2 (exec.c:1697)
==9483==    by 0x427FD2: execpline (exec.c:1484)
==9483==    by 0x42779A: execlist (exec.c:1275)
==9483==    by 0x42717C: execode (exec.c:1073)
==9483==    by 0x431299: runshfunc (exec.c:5040)
==9483==    by 0x430E76: doshfunc (exec.c:4920)
==9483==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9483== 
==9483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9482== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9482-by-pythonnut-on-???
==9482== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9482-by-pythonnut-on-???
==9482== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9482-by-pythonnut-on-???
==9482== 
==9482== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9482== don't want to do, unless you know exactly what you're doing,
==9482== or are doing some strange experiment):
==9482==   /usr/lib/valgrind/../../bin/vgdb --pid=9482 ...command...
==9482== 
==9482== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9482==   /path/to/gdb ./zsh
==9482== and then give GDB the following command
==9482==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9482
==9482== --pid is optional if only one valgrind process is running
==9482== 
--9482-- Caught __NR_exit; running __libc_freeres()
--9482-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9482== 
==9482== HEAP SUMMARY:
==9482==     in use at exit: 3,118,273 bytes in 68,940 blocks
==9482==   total heap usage: 935,619 allocs, 866,679 frees, 66,612,272 bytes allocated
==9482== 
==9482== Searching for pointers to 68,940 not-freed blocks
--9482--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9482--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9482--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9482--   Scanning root segment: 0x4037000..0x403afff (16384)
--9482--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9482--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9482--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9482--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9482--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9482--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9482--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9482--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9482--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9482--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9482--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9482--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9482--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9482--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9482--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9482--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9482--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9482--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9482--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9482--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9482--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9482--   Scanning root segment: 0x701a000..0x701afff (4096)
--9482--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9482--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9482--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9482--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9482--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9482--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9482--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9482--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9482--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9482== Checked 4,779,800 bytes
==9482== 
==9482== LEAK SUMMARY:
==9482==    definitely lost: 1,533 bytes in 8 blocks
==9482==    indirectly lost: 6,756 bytes in 7 blocks
==9482==      possibly lost: 0 bytes in 0 blocks
==9482==    still reachable: 3,109,984 bytes in 68,925 blocks
==9482==         suppressed: 0 bytes in 0 blocks
==9482== Rerun with --leak-check=full to see details of leaked memory
==9482== 
==9482== Use --track-origins=yes to see where uninitialised values come from
==9482== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9482== 
==9482== 1 errors in context 1 of 2:
==9482== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9482==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9482==    by 0x488CD0: stringsubst (subst.c:301)
==9482==    by 0x48801B: prefork (subst.c:77)
==9482==    by 0x42B318: execcmd (exec.c:2619)
==9482==    by 0x428CA0: execpline2 (exec.c:1697)
==9482==    by 0x427FD2: execpline (exec.c:1484)
==9482==    by 0x427756: execlist (exec.c:1267)
==9482==    by 0x42717C: execode (exec.c:1073)
==9482==    by 0x431299: runshfunc (exec.c:5040)
==9482==    by 0x430E76: doshfunc (exec.c:4920)
==9482==    by 0x4302FB: execshfunc (exec.c:4557)
==9482==    by 0x42D8C1: execcmd (exec.c:3373)
==9482== 
==9482== 
==9482== 2 errors in context 2 of 2:
==9482== Conditional jump or move depends on uninitialised value(s)
==9482==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9482==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9482==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9482==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9482==    by 0x42D8E9: execcmd (exec.c:3378)
==9482==    by 0x428CA0: execpline2 (exec.c:1697)
==9482==    by 0x427FD2: execpline (exec.c:1484)
==9482==    by 0x42779A: execlist (exec.c:1275)
==9482==    by 0x42717C: execode (exec.c:1073)
==9482==    by 0x431299: runshfunc (exec.c:5040)
==9482==    by 0x430E76: doshfunc (exec.c:4920)
==9482==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9482== 
==9482== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9399-- Caught __NR_exit; running __libc_freeres()
--9399-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9399== 
==9399== HEAP SUMMARY:
==9399==     in use at exit: 3,115,805 bytes in 68,873 blocks
==9399==   total heap usage: 935,618 allocs, 866,745 frees, 66,613,856 bytes allocated
==9399== 
==9399== Searching for pointers to 68,873 not-freed blocks
--9399--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9399--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9399--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9399--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9399--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9399--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9399--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9399--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9399--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9399--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9399--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9399--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9399--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9399--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9399--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9399--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9399--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9399--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9399--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9399--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9399--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9399--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9399--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9399--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9399--   Scanning root segment: 0x701a000..0x701afff (4096)
--9399--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9399--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9399--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9399--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9399--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9399--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9399--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9399--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9399--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9399== Checked 4,757,928 bytes
==9399== 
==9399== LEAK SUMMARY:
==9399==    definitely lost: 1,533 bytes in 8 blocks
==9399==    indirectly lost: 6,756 bytes in 7 blocks
==9399==      possibly lost: 0 bytes in 0 blocks
==9399==    still reachable: 3,107,516 bytes in 68,858 blocks
==9399==         suppressed: 0 bytes in 0 blocks
==9399== Rerun with --leak-check=full to see details of leaked memory
==9399== 
==9399== Use --track-origins=yes to see where uninitialised values come from
==9399== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9399== 
==9399== 1 errors in context 1 of 2:
==9399== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9399==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9399==    by 0x488CD0: stringsubst (subst.c:301)
==9399==    by 0x48801B: prefork (subst.c:77)
==9399==    by 0x42B318: execcmd (exec.c:2619)
==9399==    by 0x428CA0: execpline2 (exec.c:1697)
==9399==    by 0x427FD2: execpline (exec.c:1484)
==9399==    by 0x427756: execlist (exec.c:1267)
==9399==    by 0x42717C: execode (exec.c:1073)
==9399==    by 0x431299: runshfunc (exec.c:5040)
==9399==    by 0x430E76: doshfunc (exec.c:4920)
==9399==    by 0x4302FB: execshfunc (exec.c:4557)
==9399==    by 0x42D8C1: execcmd (exec.c:3373)
==9399== 
==9399== 
==9399== 2 errors in context 2 of 2:
==9399== Conditional jump or move depends on uninitialised value(s)
==9399==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9399==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9399==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9399==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9399==    by 0x42D8E9: execcmd (exec.c:3378)
==9399==    by 0x428CA0: execpline2 (exec.c:1697)
==9399==    by 0x427FD2: execpline (exec.c:1484)
==9399==    by 0x42779A: execlist (exec.c:1275)
==9399==    by 0x42717C: execode (exec.c:1073)
==9399==    by 0x431299: runshfunc (exec.c:5040)
==9399==    by 0x430E76: doshfunc (exec.c:4920)
==9399==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9399== 
==9399== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9485== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9485-by-pythonnut-on-???
==9485== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9485-by-pythonnut-on-???
==9485== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9485-by-pythonnut-on-???
==9485== 
==9485== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9485== don't want to do, unless you know exactly what you're doing,
==9485== or are doing some strange experiment):
==9485==   /usr/lib/valgrind/../../bin/vgdb --pid=9485 ...command...
==9485== 
==9485== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9485==   /path/to/gdb ./zsh
==9485== and then give GDB the following command
==9485==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9485
==9485== --pid is optional if only one valgrind process is running
==9485== 
==9487== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9487-by-pythonnut-on-???
==9487== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9487-by-pythonnut-on-???
==9487== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9487-by-pythonnut-on-???
==9487== 
==9487== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9487== don't want to do, unless you know exactly what you're doing,
==9487== or are doing some strange experiment):
==9487==   /usr/lib/valgrind/../../bin/vgdb --pid=9487 ...command...
==9487== 
==9487== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9487==   /path/to/gdb ./zsh
==9487== and then give GDB the following command
==9487==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9487
==9487== --pid is optional if only one valgrind process is running
==9487== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==9486== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9486-by-pythonnut-on-???
==9486== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9486-by-pythonnut-on-???
==9486== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9486-by-pythonnut-on-???
==9486== 
==9486== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9486== don't want to do, unless you know exactly what you're doing,
==9486== or are doing some strange experiment):
==9486==   /usr/lib/valgrind/../../bin/vgdb --pid=9486 ...command...
==9486== 
==9486== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9486==   /path/to/gdb ./zsh
==9486== and then give GDB the following command
==9486==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9486
==9486== --pid is optional if only one valgrind process is running
==9486== 
--9486-- Caught __NR_exit; running __libc_freeres()
--9486-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9486== 
==9486== HEAP SUMMARY:
==9486==     in use at exit: 3,116,309 bytes in 68,885 blocks
==9486==   total heap usage: 935,462 allocs, 866,577 frees, 66,570,788 bytes allocated
==9486== 
==9486== Searching for pointers to 68,885 not-freed blocks
--9486--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9486--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9486--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9486--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9486--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9486--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9486--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9486--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9486--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9486--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9486--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9486--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9486--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9486--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9486--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9486--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9486--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9486--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9486--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9486--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9486--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9486--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9486--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9486--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9486--   Scanning root segment: 0x701a000..0x701afff (4096)
--9486--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9486--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9486--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9486--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9486--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9486--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9486--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9486--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9486--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9486== Checked 4,760,480 bytes
==9486== 
==9486== LEAK SUMMARY:
==9486==    definitely lost: 1,533 bytes in 8 blocks
==9486==    indirectly lost: 6,756 bytes in 7 blocks
==9486==      possibly lost: 0 bytes in 0 blocks
==9486==    still reachable: 3,108,020 bytes in 68,870 blocks
==9486==         suppressed: 0 bytes in 0 blocks
==9486== Rerun with --leak-check=full to see details of leaked memory
==9486== 
==9486== Use --track-origins=yes to see where uninitialised values come from
==9486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9486== 
==9486== 1 errors in context 1 of 2:
==9486== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9486==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9486==    by 0x488CD0: stringsubst (subst.c:301)
==9486==    by 0x48801B: prefork (subst.c:77)
==9486==    by 0x42B318: execcmd (exec.c:2619)
==9486==    by 0x428CA0: execpline2 (exec.c:1697)
==9486==    by 0x427FD2: execpline (exec.c:1484)
==9486==    by 0x427756: execlist (exec.c:1267)
==9486==    by 0x42717C: execode (exec.c:1073)
==9486==    by 0x431299: runshfunc (exec.c:5040)
==9486==    by 0x430E76: doshfunc (exec.c:4920)
==9486==    by 0x4302FB: execshfunc (exec.c:4557)
==9486==    by 0x42D8C1: execcmd (exec.c:3373)
==9486== 
==9486== 
==9486== 2 errors in context 2 of 2:
==9486== Conditional jump or move depends on uninitialised value(s)
==9486==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9486==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9486==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9486==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9486==    by 0x42D8E9: execcmd (exec.c:3378)
==9486==    by 0x428CA0: execpline2 (exec.c:1697)
==9486==    by 0x427FD2: execpline (exec.c:1484)
==9486==    by 0x42779A: execlist (exec.c:1275)
==9486==    by 0x42717C: execode (exec.c:1073)
==9486==    by 0x431299: runshfunc (exec.c:5040)
==9486==    by 0x430E76: doshfunc (exec.c:4920)
==9486==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9486== 
==9486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9490-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9490== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9490-by-pythonnut-on-???
==9490== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9490-by-pythonnut-on-???
==9490== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9490-by-pythonnut-on-???
==9490== 
==9490== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9490== don't want to do, unless you know exactly what you're doing,
==9490== or are doing some strange experiment):
==9490==   /usr/lib/valgrind/../../bin/vgdb --pid=9490 ...command...
==9490== 
==9490== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9490==   /path/to/gdb ./zsh
==9490== and then give GDB the following command
==9490==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9490
==9490== --pid is optional if only one valgrind process is running
==9490== 
client request: code 4d430005,  addr 0xFFEFFB37C,  len 4
client request: code 4d430005,  addr 0xFFEFF836C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF895C,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFEEBFC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
==9492== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9492-by-pythonnut-on-???
==9492== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9492-by-pythonnut-on-???
==9492== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9492-by-pythonnut-on-???
==9492== 
==9492== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9492== don't want to do, unless you know exactly what you're doing,
==9492== or are doing some strange experiment):
==9492==   /usr/lib/valgrind/../../bin/vgdb --pid=9492 ...command...
==9492== 
==9492== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9492==   /path/to/gdb ./zsh
==9492== and then give GDB the following command
==9492==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9492
==9492== --pid is optional if only one valgrind process is running
==9492== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
==9493== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9493-by-pythonnut-on-???
==9493== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9493-by-pythonnut-on-???
==9493== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9493-by-pythonnut-on-???
==9493== 
==9493== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9493== don't want to do, unless you know exactly what you're doing,
==9493== or are doing some strange experiment):
==9493==   /usr/lib/valgrind/../../bin/vgdb --pid=9493 ...command...
==9493== 
==9493== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9493==   /path/to/gdb ./zsh
==9493== and then give GDB the following command
==9493==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9493
==9493== --pid is optional if only one valgrind process is running
==9493== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
--9493-- Caught __NR_exit; running __libc_freeres()
--9493-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9493== 
==9493== HEAP SUMMARY:
==9493==     in use at exit: 3,147,995 bytes in 69,382 blocks
==9493==   total heap usage: 939,232 allocs, 869,850 frees, 68,340,739 bytes allocated
==9493== 
==9493== Searching for pointers to 69,382 not-freed blocks
--9493--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9493--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9493--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9493--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9493--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9493--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9493--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9493--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9493--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9493--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9493--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9493--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9493--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9493--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9493--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9493--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9493--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9493--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9493--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9493--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9493--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9493--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9493--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9493--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9493--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9493--   Scanning root segment: 0x701a000..0x701afff (4096)
--9493--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9493--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9493--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9493--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9493--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9493--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9493--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9493--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9493--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9493== Checked 4,848,552 bytes
==9493== 
==9493== LEAK SUMMARY:
==9493==    definitely lost: 1,533 bytes in 8 blocks
==9493==    indirectly lost: 6,756 bytes in 7 blocks
==9493==      possibly lost: 0 bytes in 0 blocks
==9493==    still reachable: 3,139,706 bytes in 69,367 blocks
==9493==         suppressed: 0 bytes in 0 blocks
==9493== Rerun with --leak-check=full to see details of leaked memory
==9493== 
==9493== Use --track-origins=yes to see where uninitialised values come from
==9493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9493== 
==9493== 1 errors in context 1 of 2:
==9493== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9493==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9493==    by 0x488CD0: stringsubst (subst.c:301)
==9493==    by 0x48801B: prefork (subst.c:77)
==9493==    by 0x42B318: execcmd (exec.c:2619)
==9493==    by 0x428CA0: execpline2 (exec.c:1697)
==9493==    by 0x427FD2: execpline (exec.c:1484)
==9493==    by 0x427756: execlist (exec.c:1267)
==9493==    by 0x42717C: execode (exec.c:1073)
==9493==    by 0x431299: runshfunc (exec.c:5040)
==9493==    by 0x430E76: doshfunc (exec.c:4920)
==9493==    by 0x4302FB: execshfunc (exec.c:4557)
==9493==    by 0x42D8C1: execcmd (exec.c:3373)
==9493== 
==9493== 
==9493== 2 errors in context 2 of 2:
==9493== Conditional jump or move depends on uninitialised value(s)
==9493==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9493==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9493==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9493==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9493==    by 0x42D8E9: execcmd (exec.c:3378)
==9493==    by 0x428CA0: execpline2 (exec.c:1697)
==9493==    by 0x427FD2: execpline (exec.c:1484)
==9493==    by 0x42779A: execlist (exec.c:1275)
==9493==    by 0x42717C: execode (exec.c:1073)
==9493==    by 0x431299: runshfunc (exec.c:5040)
==9493==    by 0x430E76: doshfunc (exec.c:4920)
==9493==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9493== 
==9493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9492-- Caught __NR_exit; running __libc_freeres()
--9492-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9492== 
==9492== HEAP SUMMARY:
==9492==     in use at exit: 3,145,713 bytes in 69,302 blocks
==9492==   total heap usage: 939,137 allocs, 869,835 frees, 68,108,800 bytes allocated
==9492== 
==9494== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9494-by-pythonnut-on-???
==9494== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9494-by-pythonnut-on-???
==9494== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9494-by-pythonnut-on-???
==9494== 
==9494== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9494== don't want to do, unless you know exactly what you're doing,
==9494== or are doing some strange experiment):
==9494==   /usr/lib/valgrind/../../bin/vgdb --pid=9494 ...command...
==9494== 
==9494== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9494==   /path/to/gdb ./zsh
==9494== and then give GDB the following command
==9494==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9494
==9494== --pid is optional if only one valgrind process is running
==9494== 
==9492== Searching for pointers to 69,302 not-freed blocks
--9492--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9492--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9492--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9492--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9492--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9492--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9492--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9492--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9492--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9492--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9492--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9492--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9492--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9492--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9492--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9492--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9492--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9492--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9492--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9492--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9492--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9492--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9492--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9492--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9492--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9492--   Scanning root segment: 0x701a000..0x701afff (4096)
--9492--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9492--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9492--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9492--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9492--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9492--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9492--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9492--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9492--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9494-- Caught __NR_exit; running __libc_freeres()
--9494-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9494== 
==9494== HEAP SUMMARY:
==9494==     in use at exit: 3,156,775 bytes in 69,075 blocks
==9494==   total heap usage: 935,537 allocs, 866,462 frees, 66,603,912 bytes allocated
==9494== 
==9492== Checked 4,844,576 bytes
==9492== 
==9494== Searching for pointers to 69,075 not-freed blocks
--9494--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9494--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9494--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9494--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9494--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9494--   Scanning root segment: 0x41d6000..0x421efff (299008)
--9494--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9494--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9494--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9494--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9494--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9494--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9494--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9494--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9494--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9494--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9494--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9494--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9494--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9494--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9494--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9494--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9494--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9494--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9494--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9494--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9494--   Scanning root segment: 0x701a000..0x701afff (4096)
--9494--   Scanning root segment: 0x881b000..0x8837fff (118784)
--9494--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9494--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9494--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9494--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9494--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9494--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9494--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9494--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9494--   Scanning root segment: 0xbc84000..0xbc96fff (77824)
--9494--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9492== LEAK SUMMARY:
==9492==    definitely lost: 1,533 bytes in 8 blocks
==9492==    indirectly lost: 6,756 bytes in 7 blocks
==9492==      possibly lost: 0 bytes in 0 blocks
==9492==    still reachable: 3,137,424 bytes in 69,287 blocks
==9492==         suppressed: 0 bytes in 0 blocks
==9492== Rerun with --leak-check=full to see details of leaked memory
==9492== 
==9492== Use --track-origins=yes to see where uninitialised values come from
==9492== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9492== 
==9492== 1 errors in context 1 of 2:
==9492== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9492==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9492==    by 0x488CD0: stringsubst (subst.c:301)
==9492==    by 0x48801B: prefork (subst.c:77)
==9492==    by 0x42B318: execcmd (exec.c:2619)
==9492==    by 0x428CA0: execpline2 (exec.c:1697)
==9492==    by 0x427FD2: execpline (exec.c:1484)
==9492==    by 0x427756: execlist (exec.c:1267)
==9492==    by 0x42717C: execode (exec.c:1073)
==9492==    by 0x431299: runshfunc (exec.c:5040)
==9492==    by 0x430E76: doshfunc (exec.c:4920)
==9492==    by 0x4302FB: execshfunc (exec.c:4557)
==9492==    by 0x42D8C1: execcmd (exec.c:3373)
==9492== 
==9492== 
==9492== 2 errors in context 2 of 2:
==9492== Conditional jump or move depends on uninitialised value(s)
==9492==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9492==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9492==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9492==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9492==    by 0x42D8E9: execcmd (exec.c:3378)
==9492==    by 0x428CA0: execpline2 (exec.c:1697)
==9492==    by 0x427FD2: execpline (exec.c:1484)
==9492==    by 0x42779A: execlist (exec.c:1275)
==9492==    by 0x42717C: execode (exec.c:1073)
==9492==    by 0x431299: runshfunc (exec.c:5040)
==9492==    by 0x430E76: doshfunc (exec.c:4920)
==9492==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9492== 
==9492== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9495== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9495-by-pythonnut-on-???
==9495== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9495-by-pythonnut-on-???
==9495== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9495-by-pythonnut-on-???
==9495== 
==9495== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9495== don't want to do, unless you know exactly what you're doing,
==9495== or are doing some strange experiment):
==9495==   /usr/lib/valgrind/../../bin/vgdb --pid=9495 ...command...
==9495== 
==9495== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9495==   /path/to/gdb ./zsh
==9495== and then give GDB the following command
==9495==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9495
==9495== --pid is optional if only one valgrind process is running
==9495== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==9496== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9496-by-pythonnut-on-???
==9496== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9496-by-pythonnut-on-???
==9496== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9496-by-pythonnut-on-???
==9496== 
==9496== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9496== don't want to do, unless you know exactly what you're doing,
==9496== or are doing some strange experiment):
==9496==   /usr/lib/valgrind/../../bin/vgdb --pid=9496 ...command...
==9496== 
==9496== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9496==   /path/to/gdb ./zsh
==9496== and then give GDB the following command
==9496==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9496
==9496== --pid is optional if only one valgrind process is running
==9496== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--9496-- Caught __NR_exit; running __libc_freeres()
--9496-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9496== 
==9494== Checked 5,388,032 bytes
==9494== 
==9496== HEAP SUMMARY:
==9496==     in use at exit: 3,148,242 bytes in 69,390 blocks
==9496==   total heap usage: 939,249 allocs, 869,859 frees, 68,310,910 bytes allocated
==9496== 
==9494== LEAK SUMMARY:
==9494==    definitely lost: 1,533 bytes in 8 blocks
==9494==    indirectly lost: 6,756 bytes in 7 blocks
==9494==      possibly lost: 0 bytes in 0 blocks
==9494==    still reachable: 3,148,486 bytes in 69,060 blocks
==9494==         suppressed: 0 bytes in 0 blocks
==9494== Rerun with --leak-check=full to see details of leaked memory
==9494== 
==9494== Use --track-origins=yes to see where uninitialised values come from
==9494== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9494== 
==9494== 1 errors in context 1 of 2:
==9494== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9494==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9494==    by 0x488CD0: stringsubst (subst.c:301)
==9494==    by 0x48801B: prefork (subst.c:77)
==9494==    by 0x42B318: execcmd (exec.c:2619)
==9494==    by 0x428CA0: execpline2 (exec.c:1697)
==9494==    by 0x427FD2: execpline (exec.c:1484)
==9494==    by 0x427756: execlist (exec.c:1267)
==9494==    by 0x42717C: execode (exec.c:1073)
==9494==    by 0x431299: runshfunc (exec.c:5040)
==9494==    by 0x430E76: doshfunc (exec.c:4920)
==9494==    by 0x4302FB: execshfunc (exec.c:4557)
==9494==    by 0x42D8C1: execcmd (exec.c:3373)
==9494== 
==9494== 
==9494== 2 errors in context 2 of 2:
==9494== Conditional jump or move depends on uninitialised value(s)
==9494==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9494==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9494==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9494==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9494==    by 0x42D8E9: execcmd (exec.c:3378)
==9494==    by 0x428CA0: execpline2 (exec.c:1697)
==9494==    by 0x427FD2: execpline (exec.c:1484)
==9494==    by 0x42779A: execlist (exec.c:1275)
==9494==    by 0x42717C: execode (exec.c:1073)
==9494==    by 0x431299: runshfunc (exec.c:5040)
==9494==    by 0x430E76: doshfunc (exec.c:4920)
==9494==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9494== 
==9494== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9496== Searching for pointers to 69,390 not-freed blocks
--9496--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9496--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9496--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9496--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9496--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9496--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9496--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9496--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9496--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9496--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9496--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9496--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9496--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9496--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9496--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9496--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9496--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9496--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9496--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9496--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9496--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9496--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9496--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9496--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9496--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9496--   Scanning root segment: 0x701a000..0x701afff (4096)
--9496--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9496--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9496--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9496--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9496--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9496--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9496--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9496--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9496--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9427-- Caught __NR_exit; running __libc_freeres()
--9427-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9427== 
==9427== HEAP SUMMARY:
==9427==     in use at exit: 3,118,776 bytes in 68,989 blocks
==9427==   total heap usage: 937,012 allocs, 868,023 frees, 66,697,131 bytes allocated
==9427== 
==9496== Checked 4,849,280 bytes
==9496== 
==9427== Searching for pointers to 68,989 not-freed blocks
--9427--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9427--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9427--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9427--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9427--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9427--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9427--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9427--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9427--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9427--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9427--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9427--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9427--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9427--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9427--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9427--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9427--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9427--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9427--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9427--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9427--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9427--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9427--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9427--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9427--   Scanning root segment: 0x701a000..0x701afff (4096)
--9427--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9427--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9427--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9427--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9427--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9427--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9427--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9427--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9427--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9496== LEAK SUMMARY:
==9496==    definitely lost: 1,533 bytes in 8 blocks
==9496==    indirectly lost: 6,756 bytes in 7 blocks
==9496==      possibly lost: 0 bytes in 0 blocks
==9496==    still reachable: 3,139,953 bytes in 69,375 blocks
==9496==         suppressed: 0 bytes in 0 blocks
==9496== Rerun with --leak-check=full to see details of leaked memory
==9496== 
==9496== Use --track-origins=yes to see where uninitialised values come from
==9496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9496== 
==9496== 1 errors in context 1 of 2:
==9496== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9496==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9496==    by 0x488CD0: stringsubst (subst.c:301)
==9496==    by 0x48801B: prefork (subst.c:77)
==9496==    by 0x42B318: execcmd (exec.c:2619)
==9496==    by 0x428CA0: execpline2 (exec.c:1697)
==9496==    by 0x427FD2: execpline (exec.c:1484)
==9496==    by 0x427756: execlist (exec.c:1267)
==9496==    by 0x42717C: execode (exec.c:1073)
==9496==    by 0x431299: runshfunc (exec.c:5040)
==9496==    by 0x430E76: doshfunc (exec.c:4920)
==9496==    by 0x4302FB: execshfunc (exec.c:4557)
==9496==    by 0x42D8C1: execcmd (exec.c:3373)
==9496== 
==9496== 
==9496== 2 errors in context 2 of 2:
==9496== Conditional jump or move depends on uninitialised value(s)
==9496==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9496==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9496==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9496==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9496==    by 0x42D8E9: execcmd (exec.c:3378)
==9496==    by 0x428CA0: execpline2 (exec.c:1697)
==9496==    by 0x427FD2: execpline (exec.c:1484)
==9496==    by 0x42779A: execlist (exec.c:1275)
==9496==    by 0x42717C: execode (exec.c:1073)
==9496==    by 0x431299: runshfunc (exec.c:5040)
==9496==    by 0x430E76: doshfunc (exec.c:4920)
==9496==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9496== 
==9496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9495-- Caught __NR_exit; running __libc_freeres()
--9495-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9495== 
==9495== HEAP SUMMARY:
==9495==     in use at exit: 3,145,986 bytes in 69,310 blocks
==9495==   total heap usage: 939,152 allocs, 869,842 frees, 68,111,713 bytes allocated
==9495== 
==9495== Searching for pointers to 69,310 not-freed blocks
--9495--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9495--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9495--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9495--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9495--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9495--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9495--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9495--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9495--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9495--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9495--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9495--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9495--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9495--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9495--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9495--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9495--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9495--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9495--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9495--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9495--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9495--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9495--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9495--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9495--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9495--   Scanning root segment: 0x701a000..0x701afff (4096)
--9495--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9495--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9495--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9495--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9495--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9495--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9495--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9495--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9495--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9427== Checked 4,782,416 bytes
==9427== 
==9427== LEAK SUMMARY:
==9427==    definitely lost: 1,533 bytes in 8 blocks
==9427==    indirectly lost: 6,756 bytes in 7 blocks
==9427==      possibly lost: 0 bytes in 0 blocks
==9427==    still reachable: 3,110,487 bytes in 68,974 blocks
==9427==         suppressed: 0 bytes in 0 blocks
==9427== Rerun with --leak-check=full to see details of leaked memory
==9427== 
==9427== Use --track-origins=yes to see where uninitialised values come from
==9427== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9427== 
==9427== 1 errors in context 1 of 2:
==9427== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9427==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9427==    by 0x488CD0: stringsubst (subst.c:301)
==9427==    by 0x48801B: prefork (subst.c:77)
==9427==    by 0x42B318: execcmd (exec.c:2619)
==9427==    by 0x428CA0: execpline2 (exec.c:1697)
==9427==    by 0x427FD2: execpline (exec.c:1484)
==9427==    by 0x427756: execlist (exec.c:1267)
==9427==    by 0x42717C: execode (exec.c:1073)
==9427==    by 0x431299: runshfunc (exec.c:5040)
==9427==    by 0x430E76: doshfunc (exec.c:4920)
==9427==    by 0x4302FB: execshfunc (exec.c:4557)
==9427==    by 0x42D8C1: execcmd (exec.c:3373)
==9427== 
==9427== 
==9427== 2 errors in context 2 of 2:
==9427== Conditional jump or move depends on uninitialised value(s)
==9427==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9427==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9427==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9427==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9427==    by 0x42D8E9: execcmd (exec.c:3378)
==9427==    by 0x428CA0: execpline2 (exec.c:1697)
==9427==    by 0x427FD2: execpline (exec.c:1484)
==9427==    by 0x42779A: execlist (exec.c:1275)
==9427==    by 0x42717C: execode (exec.c:1073)
==9427==    by 0x431299: runshfunc (exec.c:5040)
==9427==    by 0x430E76: doshfunc (exec.c:4920)
==9427==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9427== 
==9427== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9393-- Caught __NR_exit; running __libc_freeres()
--9393-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFE62DC,  len 4
==9393== 
==9393== HEAP SUMMARY:
==9393==     in use at exit: 3,116,779 bytes in 68,919 blocks
==9393==   total heap usage: 935,375 allocs, 866,456 frees, 66,324,081 bytes allocated
==9393== 
==9500== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9500-by-pythonnut-on-???
==9500== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9500-by-pythonnut-on-???
==9500== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9500-by-pythonnut-on-???
==9500== 
==9500== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9500== don't want to do, unless you know exactly what you're doing,
==9500== or are doing some strange experiment):
==9500==   /usr/lib/valgrind/../../bin/vgdb --pid=9500 ...command...
==9500== 
==9500== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9500==   /path/to/gdb ./zsh
==9500== and then give GDB the following command
==9500==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9500
==9500== --pid is optional if only one valgrind process is running
==9500== 
==9495== Checked 4,845,336 bytes
==9495== 
==9393== Searching for pointers to 68,919 not-freed blocks
--9393--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9393--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9393--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9393--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9393--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9393--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9393--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9393--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9393--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9393--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9393--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9393--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9393--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9393--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9393--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9393--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9393--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9393--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9393--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9393--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9393--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9393--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9393--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9393--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9393--   Scanning root segment: 0x701a000..0x701afff (4096)
--9393--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9393--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9393--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9393--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9393--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9393--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9393--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9393--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9393--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9501-- Caught __NR_exit; running __libc_freeres()
==9495== LEAK SUMMARY:
==9495==    definitely lost: 1,533 bytes in 8 blocks
==9495==    indirectly lost: 6,756 bytes in 7 blocks
==9495==      possibly lost: 0 bytes in 0 blocks
==9495==    still reachable: 3,137,697 bytes in 69,295 blocks
==9495==         suppressed: 0 bytes in 0 blocks
==9495== Rerun with --leak-check=full to see details of leaked memory
==9495== 
==9495== Use --track-origins=yes to see where uninitialised values come from
==9495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9495== 
==9495== 1 errors in context 1 of 2:
==9495== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9495==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9495==    by 0x488CD0: stringsubst (subst.c:301)
==9495==    by 0x48801B: prefork (subst.c:77)
==9495==    by 0x42B318: execcmd (exec.c:2619)
==9495==    by 0x428CA0: execpline2 (exec.c:1697)
==9495==    by 0x427FD2: execpline (exec.c:1484)
==9495==    by 0x427756: execlist (exec.c:1267)
==9495==    by 0x42717C: execode (exec.c:1073)
==9495==    by 0x431299: runshfunc (exec.c:5040)
==9495==    by 0x430E76: doshfunc (exec.c:4920)
==9495==    by 0x4302FB: execshfunc (exec.c:4557)
==9495==    by 0x42D8C1: execcmd (exec.c:3373)
==9495== 
==9495== 
==9495== 2 errors in context 2 of 2:
==9495== Conditional jump or move depends on uninitialised value(s)
==9495==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9495==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9495==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9495==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9495==    by 0x42D8E9: execcmd (exec.c:3378)
==9495==    by 0x428CA0: execpline2 (exec.c:1697)
==9495==    by 0x427FD2: execpline (exec.c:1484)
==9495==    by 0x42779A: execlist (exec.c:1275)
==9495==    by 0x42717C: execode (exec.c:1073)
==9495==    by 0x431299: runshfunc (exec.c:5040)
==9495==    by 0x430E76: doshfunc (exec.c:4920)
==9495==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9495== 
==9495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE6C4C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
==9501== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9501-by-pythonnut-on-???
==9501== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9501-by-pythonnut-on-???
==9501== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9501-by-pythonnut-on-???
==9501== 
==9501== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9501== don't want to do, unless you know exactly what you're doing,
==9501== or are doing some strange experiment):
==9501==   /usr/lib/valgrind/../../bin/vgdb --pid=9501 ...command...
==9501== 
==9501== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9501==   /path/to/gdb ./zsh
==9501== and then give GDB the following command
==9501==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9501
==9501== --pid is optional if only one valgrind process is running
==9501== 
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
--9501-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9501== 
==9501== HEAP SUMMARY:
==9501==     in use at exit: 3,160,739 bytes in 69,840 blocks
==9501==   total heap usage: 1,047,357 allocs, 977,517 frees, 71,854,126 bytes allocated
==9501== 
client request: code 4d430005,  addr 0xFFEFEE74C,  len 4
--9503-- Caught __NR_exit; running __libc_freeres()
==9501== Searching for pointers to 69,840 not-freed blocks
--9501--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9501--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9501--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9501--   Scanning root segment: 0x4037000..0x403afff (16384)
--9501--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9501--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9501--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9501--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9501--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9501--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9501--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9501--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9501--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9501--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9501--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9501--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9501--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9501--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9501--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9501--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9501--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9501--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9501--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9501--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9501--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9501--   Scanning root segment: 0x701a000..0x701afff (4096)
--9501--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9501--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9501--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9501--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9501--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9501--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9501--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9501--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9501--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9503== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9503-by-pythonnut-on-???
==9503== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9503-by-pythonnut-on-???
==9503== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9503-by-pythonnut-on-???
==9503== 
==9503== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9503== don't want to do, unless you know exactly what you're doing,
==9503== or are doing some strange experiment):
==9503==   /usr/lib/valgrind/../../bin/vgdb --pid=9503 ...command...
==9503== 
==9503== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9503==   /path/to/gdb ./zsh
==9503== and then give GDB the following command
==9503==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9503
==9503== --pid is optional if only one valgrind process is running
==9503== 
==9393== Checked 4,780,024 bytes
==9393== 
--9503-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9393== LEAK SUMMARY:
==9393==    definitely lost: 1,533 bytes in 8 blocks
==9393==    indirectly lost: 6,756 bytes in 7 blocks
==9393==      possibly lost: 0 bytes in 0 blocks
==9393==    still reachable: 3,108,490 bytes in 68,904 blocks
==9393==         suppressed: 0 bytes in 0 blocks
==9393== Rerun with --leak-check=full to see details of leaked memory
==9393== 
==9393== Use --track-origins=yes to see where uninitialised values come from
==9393== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9393== 
==9393== 1 errors in context 1 of 2:
==9393== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9393==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9393==    by 0x488CD0: stringsubst (subst.c:301)
==9393==    by 0x48801B: prefork (subst.c:77)
==9393==    by 0x42B318: execcmd (exec.c:2619)
==9393==    by 0x428CA0: execpline2 (exec.c:1697)
==9393==    by 0x427FD2: execpline (exec.c:1484)
==9393==    by 0x427756: execlist (exec.c:1267)
==9393==    by 0x42717C: execode (exec.c:1073)
==9393==    by 0x431299: runshfunc (exec.c:5040)
==9393==    by 0x430E76: doshfunc (exec.c:4920)
==9393==    by 0x4302FB: execshfunc (exec.c:4557)
==9393==    by 0x42D8C1: execcmd (exec.c:3373)
==9393== 
==9393== 
==9393== 2 errors in context 2 of 2:
==9393== Conditional jump or move depends on uninitialised value(s)
==9393==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9393==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9393==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9393==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9393==    by 0x42D8E9: execcmd (exec.c:3378)
==9393==    by 0x428CA0: execpline2 (exec.c:1697)
==9393==    by 0x427FD2: execpline (exec.c:1484)
==9393==    by 0x42779A: execlist (exec.c:1275)
==9393==    by 0x42717C: execode (exec.c:1073)
==9393==    by 0x431299: runshfunc (exec.c:5040)
==9393==    by 0x430E76: doshfunc (exec.c:4920)
==9393==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9393== 
==9393== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9503== 
==9503== HEAP SUMMARY:
==9503==     in use at exit: 3,147,837 bytes in 69,302 blocks
==9503==   total heap usage: 939,264 allocs, 869,962 frees, 68,127,152 bytes allocated
==9503== 
==9503== Searching for pointers to 69,302 not-freed blocks
--9503--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9503--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9503--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9503--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9503--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9503--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9503--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9503--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9503--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9503--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9503--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9503--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9503--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9503--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9503--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9503--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9503--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9503--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9503--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9503--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9503--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9503--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9503--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9503--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9503--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9503--   Scanning root segment: 0x701a000..0x701afff (4096)
--9503--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9503--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9503--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9503--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9503--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9503--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9503--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9503--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9503--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9501== Checked 4,832,592 bytes
==9501== 
==9501== LEAK SUMMARY:
==9501==    definitely lost: 1,533 bytes in 8 blocks
==9501==    indirectly lost: 6,756 bytes in 7 blocks
==9501==      possibly lost: 0 bytes in 0 blocks
==9501==    still reachable: 3,152,450 bytes in 69,825 blocks
==9501==         suppressed: 0 bytes in 0 blocks
==9501== Rerun with --leak-check=full to see details of leaked memory
==9501== 
==9501== Use --track-origins=yes to see where uninitialised values come from
==9501== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9501== 
==9501== 1 errors in context 1 of 2:
==9501== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9501==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9501==    by 0x488CD0: stringsubst (subst.c:301)
==9501==    by 0x48801B: prefork (subst.c:77)
==9501==    by 0x42B318: execcmd (exec.c:2619)
==9501==    by 0x428CA0: execpline2 (exec.c:1697)
==9501==    by 0x427FD2: execpline (exec.c:1484)
==9501==    by 0x427756: execlist (exec.c:1267)
==9501==    by 0x42717C: execode (exec.c:1073)
==9501==    by 0x431299: runshfunc (exec.c:5040)
==9501==    by 0x430E76: doshfunc (exec.c:4920)
==9501==    by 0x4302FB: execshfunc (exec.c:4557)
==9501==    by 0x42D8C1: execcmd (exec.c:3373)
==9501== 
==9501== 
==9501== 2 errors in context 2 of 2:
==9501== Conditional jump or move depends on uninitialised value(s)
==9501==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9501==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9501==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9501==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9501==    by 0x42D8E9: execcmd (exec.c:3378)
==9501==    by 0x428CA0: execpline2 (exec.c:1697)
==9501==    by 0x427FD2: execpline (exec.c:1484)
==9501==    by 0x42779A: execlist (exec.c:1275)
==9501==    by 0x42717C: execode (exec.c:1073)
==9501==    by 0x431299: runshfunc (exec.c:5040)
==9501==    by 0x430E76: doshfunc (exec.c:4920)
==9501==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9501== 
==9501== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9500-- Caught __NR_exit; running __libc_freeres()
--9500-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9500== 
==9500== HEAP SUMMARY:
==9500==     in use at exit: 3,160,675 bytes in 69,837 blocks
==9500==   total heap usage: 1,047,355 allocs, 977,518 frees, 71,853,885 bytes allocated
==9500== 
==9503== Checked 4,845,584 bytes
==9503== 
==9500== Searching for pointers to 69,837 not-freed blocks
--9500--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9500--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9500--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9500--   Scanning root segment: 0x4037000..0x403afff (16384)
--9500--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9500--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9500--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9500--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9500--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9500--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9500--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9500--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9500--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9500--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9500--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9500--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9500--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9500--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9500--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9500--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9500--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9500--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9500--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9500--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9500--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9500--   Scanning root segment: 0x701a000..0x701afff (4096)
--9500--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9500--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9500--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9500--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9500--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9500--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9500--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9500--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9500--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9503== LEAK SUMMARY:
==9503==    definitely lost: 1,533 bytes in 8 blocks
==9503==    indirectly lost: 6,756 bytes in 7 blocks
==9503==      possibly lost: 0 bytes in 0 blocks
==9503==    still reachable: 3,139,548 bytes in 69,287 blocks
==9503==         suppressed: 0 bytes in 0 blocks
==9503== Rerun with --leak-check=full to see details of leaked memory
==9503== 
==9503== Use --track-origins=yes to see where uninitialised values come from
==9503== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9503== 
==9503== 1 errors in context 1 of 2:
==9503== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9503==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9503==    by 0x488CD0: stringsubst (subst.c:301)
==9503==    by 0x48801B: prefork (subst.c:77)
==9503==    by 0x42B318: execcmd (exec.c:2619)
==9503==    by 0x428CA0: execpline2 (exec.c:1697)
==9503==    by 0x427FD2: execpline (exec.c:1484)
==9503==    by 0x427756: execlist (exec.c:1267)
==9503==    by 0x42717C: execode (exec.c:1073)
==9503==    by 0x431299: runshfunc (exec.c:5040)
==9503==    by 0x430E76: doshfunc (exec.c:4920)
==9503==    by 0x4302FB: execshfunc (exec.c:4557)
==9503==    by 0x42D8C1: execcmd (exec.c:3373)
==9503== 
==9503== 
==9503== 2 errors in context 2 of 2:
==9503== Conditional jump or move depends on uninitialised value(s)
==9503==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9503==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9503==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9503==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9503==    by 0x42D8E9: execcmd (exec.c:3378)
==9503==    by 0x428CA0: execpline2 (exec.c:1697)
==9503==    by 0x427FD2: execpline (exec.c:1484)
==9503==    by 0x42779A: execlist (exec.c:1275)
==9503==    by 0x42717C: execode (exec.c:1073)
==9503==    by 0x431299: runshfunc (exec.c:5040)
==9503==    by 0x430E76: doshfunc (exec.c:4920)
==9503==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9503== 
==9503== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9505== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9505-by-pythonnut-on-???
==9505== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9505-by-pythonnut-on-???
==9505== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9505-by-pythonnut-on-???
==9505== 
==9505== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9505== don't want to do, unless you know exactly what you're doing,
==9505== or are doing some strange experiment):
==9505==   /usr/lib/valgrind/../../bin/vgdb --pid=9505 ...command...
==9505== 
==9505== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9505==   /path/to/gdb ./zsh
==9505== and then give GDB the following command
==9505==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9505
==9505== --pid is optional if only one valgrind process is running
==9505== 
--9505-- Caught __NR_exit; running __libc_freeres()
--9505-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9505== 
==9505== HEAP SUMMARY:
==9505==     in use at exit: 3,147,021 bytes in 69,258 blocks
==9505==   total heap usage: 939,221 allocs, 869,963 frees, 68,126,634 bytes allocated
==9505== 
==9505== Searching for pointers to 69,258 not-freed blocks
--9505--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9505--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9505--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9505--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9505--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9505--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9505--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9505--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9505--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9505--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9505--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9505--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9505--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9505--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9505--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9505--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9505--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9505--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9505--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9505--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9505--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9505--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9505--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9505--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9505--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9505--   Scanning root segment: 0x701a000..0x701afff (4096)
--9505--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9505--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9505--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9505--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9505--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9505--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9505--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9505--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9505--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9500== Checked 4,831,904 bytes
==9500== 
==9500== LEAK SUMMARY:
==9500==    definitely lost: 1,533 bytes in 8 blocks
==9500==    indirectly lost: 6,756 bytes in 7 blocks
==9500==      possibly lost: 0 bytes in 0 blocks
==9500==    still reachable: 3,152,386 bytes in 69,822 blocks
==9500==         suppressed: 0 bytes in 0 blocks
==9500== Rerun with --leak-check=full to see details of leaked memory
==9500== 
==9500== Use --track-origins=yes to see where uninitialised values come from
==9500== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9500== 
==9500== 1 errors in context 1 of 2:
==9500== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9500==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9500==    by 0x488CD0: stringsubst (subst.c:301)
==9500==    by 0x48801B: prefork (subst.c:77)
==9500==    by 0x42B318: execcmd (exec.c:2619)
==9500==    by 0x428CA0: execpline2 (exec.c:1697)
==9500==    by 0x427FD2: execpline (exec.c:1484)
==9500==    by 0x427756: execlist (exec.c:1267)
==9500==    by 0x42717C: execode (exec.c:1073)
==9500==    by 0x431299: runshfunc (exec.c:5040)
==9500==    by 0x430E76: doshfunc (exec.c:4920)
==9500==    by 0x4302FB: execshfunc (exec.c:4557)
==9500==    by 0x42D8C1: execcmd (exec.c:3373)
==9500== 
==9500== 
==9500== 2 errors in context 2 of 2:
==9500== Conditional jump or move depends on uninitialised value(s)
==9500==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9500==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9500==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9500==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9500==    by 0x42D8E9: execcmd (exec.c:3378)
==9500==    by 0x428CA0: execpline2 (exec.c:1697)
==9500==    by 0x427FD2: execpline (exec.c:1484)
==9500==    by 0x42779A: execlist (exec.c:1275)
==9500==    by 0x42717C: execode (exec.c:1073)
==9500==    by 0x431299: runshfunc (exec.c:5040)
==9500==    by 0x430E76: doshfunc (exec.c:4920)
==9500==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9500== 
==9500== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9506-- Caught __NR_exit; running __libc_freeres()
==9506== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9506-by-pythonnut-on-???
==9506== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9506-by-pythonnut-on-???
==9506== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9506-by-pythonnut-on-???
==9506== 
==9506== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9506== don't want to do, unless you know exactly what you're doing,
==9506== or are doing some strange experiment):
==9506==   /usr/lib/valgrind/../../bin/vgdb --pid=9506 ...command...
==9506== 
==9506== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9506==   /path/to/gdb ./zsh
==9506== and then give GDB the following command
==9506==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9506
==9506== --pid is optional if only one valgrind process is running
==9506== 
--9506-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9506== 
==9506== HEAP SUMMARY:
==9506==     in use at exit: 3,160,682 bytes in 69,837 blocks
==9506==   total heap usage: 1,047,370 allocs, 977,533 frees, 71,858,883 bytes allocated
==9506== 
==9505== Checked 4,844,264 bytes
==9505== 
==9506== Searching for pointers to 69,837 not-freed blocks
--9506--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9506--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9506--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9506--   Scanning root segment: 0x4037000..0x403afff (16384)
--9506--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9506--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9506--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9506--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9506--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9506--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9506--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9506--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9506--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9506--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9506--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9506--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9506--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9506--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9506--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9506--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9506--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9506--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9506--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9506--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9506--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9506--   Scanning root segment: 0x701a000..0x701afff (4096)
--9506--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9506--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9506--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9506--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9506--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9506--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9506--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9506--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9506--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9505== LEAK SUMMARY:
==9505==    definitely lost: 1,533 bytes in 8 blocks
==9505==    indirectly lost: 6,756 bytes in 7 blocks
==9505==      possibly lost: 0 bytes in 0 blocks
==9505==    still reachable: 3,138,732 bytes in 69,243 blocks
==9505==         suppressed: 0 bytes in 0 blocks
==9505== Rerun with --leak-check=full to see details of leaked memory
==9505== 
==9505== Use --track-origins=yes to see where uninitialised values come from
==9505== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9505== 
==9505== 1 errors in context 1 of 2:
==9505== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9505==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9505==    by 0x488CD0: stringsubst (subst.c:301)
==9505==    by 0x48801B: prefork (subst.c:77)
==9505==    by 0x42B318: execcmd (exec.c:2619)
==9505==    by 0x428CA0: execpline2 (exec.c:1697)
==9505==    by 0x427FD2: execpline (exec.c:1484)
==9505==    by 0x427756: execlist (exec.c:1267)
==9505==    by 0x42717C: execode (exec.c:1073)
==9505==    by 0x431299: runshfunc (exec.c:5040)
==9505==    by 0x430E76: doshfunc (exec.c:4920)
==9505==    by 0x4302FB: execshfunc (exec.c:4557)
==9505==    by 0x42D8C1: execcmd (exec.c:3373)
==9505== 
==9505== 
==9505== 2 errors in context 2 of 2:
==9505== Conditional jump or move depends on uninitialised value(s)
==9505==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9505==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9505==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9505==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9505==    by 0x42D8E9: execcmd (exec.c:3378)
==9505==    by 0x428CA0: execpline2 (exec.c:1697)
==9505==    by 0x427FD2: execpline (exec.c:1484)
==9505==    by 0x42779A: execlist (exec.c:1275)
==9505==    by 0x42717C: execode (exec.c:1073)
==9505==    by 0x431299: runshfunc (exec.c:5040)
==9505==    by 0x430E76: doshfunc (exec.c:4920)
==9505==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9505== 
==9505== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF2EC,  len 4
==9508== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9508-by-pythonnut-on-???
==9508== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9508-by-pythonnut-on-???
==9508== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9508-by-pythonnut-on-???
==9508== 
==9508== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9508== don't want to do, unless you know exactly what you're doing,
==9508== or are doing some strange experiment):
==9508==   /usr/lib/valgrind/../../bin/vgdb --pid=9508 ...command...
==9508== 
==9508== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9508==   /path/to/gdb ./zsh
==9508== and then give GDB the following command
==9508==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9508
==9508== --pid is optional if only one valgrind process is running
==9508== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
==9509== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9509-by-pythonnut-on-???
==9509== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9509-by-pythonnut-on-???
==9509== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9509-by-pythonnut-on-???
==9509== 
==9509== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9509== don't want to do, unless you know exactly what you're doing,
==9509== or are doing some strange experiment):
==9509==   /usr/lib/valgrind/../../bin/vgdb --pid=9509 ...command...
==9509== 
==9509== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9509==   /path/to/gdb ./zsh
==9509== and then give GDB the following command
==9509==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9509
==9509== --pid is optional if only one valgrind process is running
==9509== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
--9509-- Caught __NR_exit; running __libc_freeres()
==9506== Checked 4,832,040 bytes
==9506== 
--9509-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9509== 
==9506== LEAK SUMMARY:
==9506==    definitely lost: 1,533 bytes in 8 blocks
==9506==    indirectly lost: 6,756 bytes in 7 blocks
==9506==      possibly lost: 0 bytes in 0 blocks
==9506==    still reachable: 3,152,393 bytes in 69,822 blocks
==9506==         suppressed: 0 bytes in 0 blocks
==9506== Rerun with --leak-check=full to see details of leaked memory
==9506== 
==9506== Use --track-origins=yes to see where uninitialised values come from
==9506== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9506== 
==9506== 1 errors in context 1 of 2:
==9506== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9506==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9506==    by 0x488CD0: stringsubst (subst.c:301)
==9506==    by 0x48801B: prefork (subst.c:77)
==9506==    by 0x42B318: execcmd (exec.c:2619)
==9506==    by 0x428CA0: execpline2 (exec.c:1697)
==9506==    by 0x427FD2: execpline (exec.c:1484)
==9506==    by 0x427756: execlist (exec.c:1267)
==9506==    by 0x42717C: execode (exec.c:1073)
==9506==    by 0x431299: runshfunc (exec.c:5040)
==9506==    by 0x430E76: doshfunc (exec.c:4920)
==9506==    by 0x4302FB: execshfunc (exec.c:4557)
==9506==    by 0x42D8C1: execcmd (exec.c:3373)
==9506== 
==9506== 
==9506== 2 errors in context 2 of 2:
==9506== Conditional jump or move depends on uninitialised value(s)
==9506==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9506==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9506==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9506==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9506==    by 0x42D8E9: execcmd (exec.c:3378)
==9506==    by 0x428CA0: execpline2 (exec.c:1697)
==9506==    by 0x427FD2: execpline (exec.c:1484)
==9506==    by 0x42779A: execlist (exec.c:1275)
==9506==    by 0x42717C: execode (exec.c:1073)
==9506==    by 0x431299: runshfunc (exec.c:5040)
==9506==    by 0x430E76: doshfunc (exec.c:4920)
==9506==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9506== 
==9506== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9509== HEAP SUMMARY:
==9509==     in use at exit: 3,154,825 bytes in 69,482 blocks
==9509==   total heap usage: 939,997 allocs, 870,515 frees, 68,412,810 bytes allocated
==9509== 
==9509== Searching for pointers to 69,482 not-freed blocks
--9509--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9509--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9509--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9509--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9509--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9509--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9509--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9509--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9509--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9509--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9509--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9509--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9509--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9509--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9509--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9509--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9509--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9509--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9509--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9509--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9509--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9509--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9509--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9509--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9509--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9509--   Scanning root segment: 0x701a000..0x701afff (4096)
--9509--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9509--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9509--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9509--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9509--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9509--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9509--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9509--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9509--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9510-- Caught __NR_exit; running __libc_freeres()
==9510== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9510-by-pythonnut-on-???
==9510== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9510-by-pythonnut-on-???
==9510== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9510-by-pythonnut-on-???
==9510== 
==9510== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9510== don't want to do, unless you know exactly what you're doing,
==9510== or are doing some strange experiment):
==9510==   /usr/lib/valgrind/../../bin/vgdb --pid=9510 ...command...
==9510== 
==9510== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9510==   /path/to/gdb ./zsh
==9510== and then give GDB the following command
==9510==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9510
==9510== --pid is optional if only one valgrind process is running
==9510== 
--9510-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9510== 
==9510== HEAP SUMMARY:
==9510==     in use at exit: 3,160,778 bytes in 69,837 blocks
==9510==   total heap usage: 1,047,386 allocs, 977,549 frees, 71,863,670 bytes allocated
==9510== 
==9510== Searching for pointers to 69,837 not-freed blocks
--9510--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9510--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9510--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9510--   Scanning root segment: 0x4037000..0x403afff (16384)
--9510--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9510--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9510--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9510--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9510--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9510--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9510--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9510--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9510--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9510--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9510--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9510--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9510--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9510--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9510--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9510--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9510--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9510--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9510--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9510--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9510--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9510--   Scanning root segment: 0x701a000..0x701afff (4096)
--9510--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9510--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9510--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9510--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9510--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9510--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9510--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9510--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9510--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9509== Checked 4,852,952 bytes
==9509== 
==9509== LEAK SUMMARY:
==9509==    definitely lost: 1,533 bytes in 8 blocks
==9509==    indirectly lost: 6,756 bytes in 7 blocks
==9509==      possibly lost: 0 bytes in 0 blocks
==9509==    still reachable: 3,146,536 bytes in 69,467 blocks
==9509==         suppressed: 0 bytes in 0 blocks
==9509== Rerun with --leak-check=full to see details of leaked memory
==9509== 
==9509== Use --track-origins=yes to see where uninitialised values come from
==9509== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9509== 
==9509== 1 errors in context 1 of 2:
==9509== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9509==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9509==    by 0x488CD0: stringsubst (subst.c:301)
==9509==    by 0x48801B: prefork (subst.c:77)
==9509==    by 0x42B318: execcmd (exec.c:2619)
==9509==    by 0x428CA0: execpline2 (exec.c:1697)
==9509==    by 0x427FD2: execpline (exec.c:1484)
==9509==    by 0x427756: execlist (exec.c:1267)
==9509==    by 0x42717C: execode (exec.c:1073)
==9509==    by 0x431299: runshfunc (exec.c:5040)
==9509==    by 0x430E76: doshfunc (exec.c:4920)
==9509==    by 0x4302FB: execshfunc (exec.c:4557)
==9509==    by 0x42D8C1: execcmd (exec.c:3373)
==9509== 
==9509== 
==9509== 2 errors in context 2 of 2:
==9509== Conditional jump or move depends on uninitialised value(s)
==9509==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9509==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9509==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9509==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9509==    by 0x42D8E9: execcmd (exec.c:3378)
==9509==    by 0x428CA0: execpline2 (exec.c:1697)
==9509==    by 0x427FD2: execpline (exec.c:1484)
==9509==    by 0x42779A: execlist (exec.c:1275)
==9509==    by 0x42717C: execode (exec.c:1073)
==9509==    by 0x431299: runshfunc (exec.c:5040)
==9509==    by 0x430E76: doshfunc (exec.c:4920)
==9509==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9509== 
==9509== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9508-- Caught __NR_exit; running __libc_freeres()
==9510== Checked 4,831,320 bytes
==9510== 
--9508-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9508== 
==9508== HEAP SUMMARY:
==9508==     in use at exit: 3,152,473 bytes in 69,402 blocks
==9508==   total heap usage: 939,903 allocs, 870,501 frees, 68,213,615 bytes allocated
==9508== 
==9510== LEAK SUMMARY:
==9510==    definitely lost: 1,533 bytes in 8 blocks
==9510==    indirectly lost: 6,756 bytes in 7 blocks
==9510==      possibly lost: 0 bytes in 0 blocks
==9510==    still reachable: 3,152,489 bytes in 69,822 blocks
==9510==         suppressed: 0 bytes in 0 blocks
==9510== Rerun with --leak-check=full to see details of leaked memory
==9510== 
==9510== Use --track-origins=yes to see where uninitialised values come from
==9510== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9510== 
==9510== 1 errors in context 1 of 2:
==9510== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9510==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9510==    by 0x488CD0: stringsubst (subst.c:301)
==9510==    by 0x48801B: prefork (subst.c:77)
==9510==    by 0x42B318: execcmd (exec.c:2619)
==9510==    by 0x428CA0: execpline2 (exec.c:1697)
==9510==    by 0x427FD2: execpline (exec.c:1484)
==9510==    by 0x427756: execlist (exec.c:1267)
==9510==    by 0x42717C: execode (exec.c:1073)
==9510==    by 0x431299: runshfunc (exec.c:5040)
==9510==    by 0x430E76: doshfunc (exec.c:4920)
==9510==    by 0x4302FB: execshfunc (exec.c:4557)
==9510==    by 0x42D8C1: execcmd (exec.c:3373)
==9510== 
==9510== 
==9510== 2 errors in context 2 of 2:
==9510== Conditional jump or move depends on uninitialised value(s)
==9510==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9510==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9510==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9510==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9510==    by 0x42D8E9: execcmd (exec.c:3378)
==9510==    by 0x428CA0: execpline2 (exec.c:1697)
==9510==    by 0x427FD2: execpline (exec.c:1484)
==9510==    by 0x42779A: execlist (exec.c:1275)
==9510==    by 0x42717C: execode (exec.c:1073)
==9510==    by 0x431299: runshfunc (exec.c:5040)
==9510==    by 0x430E76: doshfunc (exec.c:4920)
==9510==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9510== 
==9510== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9508== Searching for pointers to 69,402 not-freed blocks
--9508--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9508--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9508--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9508--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9508--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9508--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9508--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9508--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9508--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9508--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9508--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9508--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9508--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9508--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9508--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9508--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9508--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9508--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9508--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9508--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9508--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9508--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9508--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9508--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9508--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9508--   Scanning root segment: 0x701a000..0x701afff (4096)
--9508--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9508--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9508--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9508--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9508--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9508--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9508--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9508--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9508--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9511== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9511-by-pythonnut-on-???
==9511== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9511-by-pythonnut-on-???
==9511== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9511-by-pythonnut-on-???
==9511== 
==9511== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9511== don't want to do, unless you know exactly what you're doing,
==9511== or are doing some strange experiment):
==9511==   /usr/lib/valgrind/../../bin/vgdb --pid=9511 ...command...
==9511== 
==9511== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9511==   /path/to/gdb ./zsh
==9511== and then give GDB the following command
==9511==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9511
==9511== --pid is optional if only one valgrind process is running
==9511== 
--9511-- Caught __NR_exit; running __libc_freeres()
--9511-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9511== 
==9511== HEAP SUMMARY:
==9511==     in use at exit: 3,161,020 bytes in 69,843 blocks
==9511==   total heap usage: 1,047,434 allocs, 977,591 frees, 71,872,686 bytes allocated
==9511== 
==9511== Searching for pointers to 69,843 not-freed blocks
--9511--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9511--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9511--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9511--   Scanning root segment: 0x4037000..0x403afff (16384)
--9511--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9511--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9511--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9511--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9511--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9511--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9511--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9511--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9511--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9511--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9511--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9511--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9511--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9511--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9511--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9511--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9511--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9511--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9511--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9511--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9511--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9511--   Scanning root segment: 0x701a000..0x701afff (4096)
--9511--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9511--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9511--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9511--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9511--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9511--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9511--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9511--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9511--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9508== Checked 4,848,904 bytes
==9508== 
==9508== LEAK SUMMARY:
==9508==    definitely lost: 1,533 bytes in 8 blocks
==9508==    indirectly lost: 6,756 bytes in 7 blocks
==9508==      possibly lost: 0 bytes in 0 blocks
==9508==    still reachable: 3,144,184 bytes in 69,387 blocks
==9508==         suppressed: 0 bytes in 0 blocks
==9508== Rerun with --leak-check=full to see details of leaked memory
==9508== 
==9508== Use --track-origins=yes to see where uninitialised values come from
==9508== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9508== 
==9508== 1 errors in context 1 of 2:
==9508== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9508==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9508==    by 0x488CD0: stringsubst (subst.c:301)
==9508==    by 0x48801B: prefork (subst.c:77)
==9508==    by 0x42B318: execcmd (exec.c:2619)
==9508==    by 0x428CA0: execpline2 (exec.c:1697)
==9508==    by 0x427FD2: execpline (exec.c:1484)
==9508==    by 0x427756: execlist (exec.c:1267)
==9508==    by 0x42717C: execode (exec.c:1073)
==9508==    by 0x431299: runshfunc (exec.c:5040)
==9508==    by 0x430E76: doshfunc (exec.c:4920)
==9508==    by 0x4302FB: execshfunc (exec.c:4557)
==9508==    by 0x42D8C1: execcmd (exec.c:3373)
==9508== 
==9508== 
==9508== 2 errors in context 2 of 2:
==9508== Conditional jump or move depends on uninitialised value(s)
==9508==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9508==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9508==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9508==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9508==    by 0x42D8E9: execcmd (exec.c:3378)
==9508==    by 0x428CA0: execpline2 (exec.c:1697)
==9508==    by 0x427FD2: execpline (exec.c:1484)
==9508==    by 0x42779A: execlist (exec.c:1275)
==9508==    by 0x42717C: execode (exec.c:1073)
==9508==    by 0x431299: runshfunc (exec.c:5040)
==9508==    by 0x430E76: doshfunc (exec.c:4920)
==9508==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9508== 
==9508== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
==9512== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9512-by-pythonnut-on-???
==9512== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9512-by-pythonnut-on-???
==9512== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9512-by-pythonnut-on-???
==9512== 
==9512== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9512== don't want to do, unless you know exactly what you're doing,
==9512== or are doing some strange experiment):
==9512==   /usr/lib/valgrind/../../bin/vgdb --pid=9512 ...command...
==9512== 
==9512== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9512==   /path/to/gdb ./zsh
==9512== and then give GDB the following command
==9512==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9512
==9512== --pid is optional if only one valgrind process is running
==9512== 
==9513== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9513-by-pythonnut-on-???
==9513== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9513-by-pythonnut-on-???
==9513== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9513-by-pythonnut-on-???
==9513== 
==9513== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9513== don't want to do, unless you know exactly what you're doing,
==9513== or are doing some strange experiment):
==9513==   /usr/lib/valgrind/../../bin/vgdb --pid=9513 ...command...
==9513== 
==9513== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9513==   /path/to/gdb ./zsh
==9513== and then give GDB the following command
==9513==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9513
==9513== --pid is optional if only one valgrind process is running
==9513== 
--9513-- Caught __NR_exit; running __libc_freeres()
==9511== Checked 4,831,488 bytes
==9511== 
--9513-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9511== LEAK SUMMARY:
==9511==    definitely lost: 1,533 bytes in 8 blocks
==9511==    indirectly lost: 6,756 bytes in 7 blocks
==9511==      possibly lost: 0 bytes in 0 blocks
==9511==    still reachable: 3,152,731 bytes in 69,828 blocks
==9511==         suppressed: 0 bytes in 0 blocks
==9511== Rerun with --leak-check=full to see details of leaked memory
==9511== 
==9511== Use --track-origins=yes to see where uninitialised values come from
==9511== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9511== 
==9511== 1 errors in context 1 of 2:
==9511== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9511==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9511==    by 0x488CD0: stringsubst (subst.c:301)
==9511==    by 0x48801B: prefork (subst.c:77)
==9511==    by 0x42B318: execcmd (exec.c:2619)
==9511==    by 0x428CA0: execpline2 (exec.c:1697)
==9511==    by 0x427FD2: execpline (exec.c:1484)
==9511==    by 0x427756: execlist (exec.c:1267)
==9511==    by 0x42717C: execode (exec.c:1073)
==9511==    by 0x431299: runshfunc (exec.c:5040)
==9511==    by 0x430E76: doshfunc (exec.c:4920)
==9511==    by 0x4302FB: execshfunc (exec.c:4557)
==9511==    by 0x42D8C1: execcmd (exec.c:3373)
==9511== 
==9511== 
==9511== 2 errors in context 2 of 2:
==9511== Conditional jump or move depends on uninitialised value(s)
==9511==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9511==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9511==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9511==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9511==    by 0x42D8E9: execcmd (exec.c:3378)
==9511==    by 0x428CA0: execpline2 (exec.c:1697)
==9511==    by 0x427FD2: execpline (exec.c:1484)
==9511==    by 0x42779A: execlist (exec.c:1275)
==9511==    by 0x42717C: execode (exec.c:1073)
==9511==    by 0x431299: runshfunc (exec.c:5040)
==9511==    by 0x430E76: doshfunc (exec.c:4920)
==9511==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9511== 
==9511== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9513== 
==9513== HEAP SUMMARY:
==9513==     in use at exit: 3,160,984 bytes in 69,570 blocks
==9513==   total heap usage: 940,215 allocs, 870,645 frees, 68,474,381 bytes allocated
==9513== 
--9516-- Caught __NR_exit; running __libc_freeres()
==9513== Searching for pointers to 69,570 not-freed blocks
--9513--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9513--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9513--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9513--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9513--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9513--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9513--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9513--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9513--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9513--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9513--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9513--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9513--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9513--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9513--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9513--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9513--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9513--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9513--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9513--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9513--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9513--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9513--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9513--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9513--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9513--   Scanning root segment: 0x701a000..0x701afff (4096)
--9513--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9513--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9513--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9513--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9513--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9513--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9513--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9513--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9513--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9516== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9516-by-pythonnut-on-???
==9516== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9516-by-pythonnut-on-???
==9516== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9516-by-pythonnut-on-???
==9516== 
==9516== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9516== don't want to do, unless you know exactly what you're doing,
==9516== or are doing some strange experiment):
==9516==   /usr/lib/valgrind/../../bin/vgdb --pid=9516 ...command...
==9516== 
==9516== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9516==   /path/to/gdb ./zsh
==9516== and then give GDB the following command
==9516==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9516
==9516== --pid is optional if only one valgrind process is running
==9516== 
--9516-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9516== 
==9516== HEAP SUMMARY:
==9516==     in use at exit: 3,160,956 bytes in 69,843 blocks
==9516==   total heap usage: 1,047,414 allocs, 977,571 frees, 71,870,456 bytes allocated
==9516== 
==9516== Searching for pointers to 69,843 not-freed blocks
--9516--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9516--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9516--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9516--   Scanning root segment: 0x4037000..0x403afff (16384)
--9516--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9516--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9516--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9516--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9516--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9516--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9516--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9516--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9516--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9516--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9516--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9516--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9516--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9516--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9516--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9516--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9516--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9516--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9516--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9516--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9516--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9516--   Scanning root segment: 0x701a000..0x701afff (4096)
--9516--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9516--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9516--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9516--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9516--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9516--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9516--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9516--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9516--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9513== Checked 4,876,600 bytes
==9513== 
==9513== LEAK SUMMARY:
==9513==    definitely lost: 1,533 bytes in 8 blocks
==9513==    indirectly lost: 6,756 bytes in 7 blocks
==9513==      possibly lost: 0 bytes in 0 blocks
==9513==    still reachable: 3,152,695 bytes in 69,555 blocks
==9513==         suppressed: 0 bytes in 0 blocks
==9513== Rerun with --leak-check=full to see details of leaked memory
==9513== 
==9513== Use --track-origins=yes to see where uninitialised values come from
==9513== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9513== 
==9513== 1 errors in context 1 of 2:
==9513== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9513==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9513==    by 0x488CD0: stringsubst (subst.c:301)
==9513==    by 0x48801B: prefork (subst.c:77)
==9513==    by 0x42B318: execcmd (exec.c:2619)
==9513==    by 0x428CA0: execpline2 (exec.c:1697)
==9513==    by 0x427FD2: execpline (exec.c:1484)
==9513==    by 0x427756: execlist (exec.c:1267)
==9513==    by 0x42717C: execode (exec.c:1073)
==9513==    by 0x431299: runshfunc (exec.c:5040)
==9513==    by 0x430E76: doshfunc (exec.c:4920)
==9513==    by 0x4302FB: execshfunc (exec.c:4557)
==9513==    by 0x42D8C1: execcmd (exec.c:3373)
==9513== 
==9513== 
==9513== 2 errors in context 2 of 2:
==9513== Conditional jump or move depends on uninitialised value(s)
==9513==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9513==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9513==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9513==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9513==    by 0x42D8E9: execcmd (exec.c:3378)
==9513==    by 0x428CA0: execpline2 (exec.c:1697)
==9513==    by 0x427FD2: execpline (exec.c:1484)
==9513==    by 0x42779A: execlist (exec.c:1275)
==9513==    by 0x42717C: execode (exec.c:1073)
==9513==    by 0x431299: runshfunc (exec.c:5040)
==9513==    by 0x430E76: doshfunc (exec.c:4920)
==9513==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9513== 
==9513== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9512-- Caught __NR_exit; running __libc_freeres()
--9512-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9512== 
==9516== Checked 4,831,416 bytes
==9512== HEAP SUMMARY:
==9512==     in use at exit: 3,158,633 bytes in 69,490 blocks
==9512==   total heap usage: 940,155 allocs, 870,665 frees, 68,244,483 bytes allocated
==9512== 
==9516== 
==9516== LEAK SUMMARY:
==9516==    definitely lost: 1,533 bytes in 8 blocks
==9516==    indirectly lost: 6,756 bytes in 7 blocks
==9516==      possibly lost: 0 bytes in 0 blocks
==9516==    still reachable: 3,152,667 bytes in 69,828 blocks
==9516==         suppressed: 0 bytes in 0 blocks
==9516== Rerun with --leak-check=full to see details of leaked memory
==9516== 
==9516== Use --track-origins=yes to see where uninitialised values come from
==9516== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9516== 
==9516== 1 errors in context 1 of 2:
==9516== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9516==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9516==    by 0x488CD0: stringsubst (subst.c:301)
==9516==    by 0x48801B: prefork (subst.c:77)
==9516==    by 0x42B318: execcmd (exec.c:2619)
==9516==    by 0x428CA0: execpline2 (exec.c:1697)
==9516==    by 0x427FD2: execpline (exec.c:1484)
==9516==    by 0x427756: execlist (exec.c:1267)
==9516==    by 0x42717C: execode (exec.c:1073)
==9516==    by 0x431299: runshfunc (exec.c:5040)
==9516==    by 0x430E76: doshfunc (exec.c:4920)
==9516==    by 0x4302FB: execshfunc (exec.c:4557)
==9516==    by 0x42D8C1: execcmd (exec.c:3373)
==9516== 
==9516== 
==9516== 2 errors in context 2 of 2:
==9516== Conditional jump or move depends on uninitialised value(s)
==9516==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9516==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9516==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9516==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9516==    by 0x42D8E9: execcmd (exec.c:3378)
==9516==    by 0x428CA0: execpline2 (exec.c:1697)
==9516==    by 0x427FD2: execpline (exec.c:1484)
==9516==    by 0x42779A: execlist (exec.c:1275)
==9516==    by 0x42717C: execode (exec.c:1073)
==9516==    by 0x431299: runshfunc (exec.c:5040)
==9516==    by 0x430E76: doshfunc (exec.c:4920)
==9516==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9516== 
==9516== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9512== Searching for pointers to 69,490 not-freed blocks
--9512--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9512--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9512--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9512--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9512--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9512--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9512--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9512--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9512--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9512--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9512--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9512--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9512--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9512--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9512--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9512--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9512--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9512--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9512--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9512--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9512--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9512--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9512--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9512--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9512--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9512--   Scanning root segment: 0x701a000..0x701afff (4096)
--9512--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9512--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9512--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9512--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9512--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9512--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9512--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9512--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9512--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9517== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9517-by-pythonnut-on-???
==9517== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9517-by-pythonnut-on-???
==9517== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9517-by-pythonnut-on-???
==9517== 
==9517== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9517== don't want to do, unless you know exactly what you're doing,
==9517== or are doing some strange experiment):
==9517==   /usr/lib/valgrind/../../bin/vgdb --pid=9517 ...command...
==9517== 
==9517== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9517==   /path/to/gdb ./zsh
==9517== and then give GDB the following command
==9517==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9517
==9517== --pid is optional if only one valgrind process is running
==9517== 
--9517-- Caught __NR_exit; running __libc_freeres()
--9517-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9517== 
==9517== HEAP SUMMARY:
==9517==     in use at exit: 3,160,994 bytes in 69,844 blocks
==9517==   total heap usage: 1,047,427 allocs, 977,583 frees, 71,873,153 bytes allocated
==9517== 
==9517== Searching for pointers to 69,844 not-freed blocks
--9517--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9517--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9517--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9517--   Scanning root segment: 0x4037000..0x403afff (16384)
--9517--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9517--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9517--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9517--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9517--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9517--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9517--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9517--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9517--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9517--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9517--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9517--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9517--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9517--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9517--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9517--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9517--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9517--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9517--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9512== Checked 4,856,296 bytes
==9512== 
--9517--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9517--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9517--   Scanning root segment: 0x701a000..0x701afff (4096)
--9517--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9517--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9517--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9517--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9517--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9517--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9517--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9517--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9517--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9512== LEAK SUMMARY:
==9512==    definitely lost: 1,533 bytes in 8 blocks
==9512==    indirectly lost: 6,756 bytes in 7 blocks
==9512==      possibly lost: 0 bytes in 0 blocks
==9512==    still reachable: 3,150,344 bytes in 69,475 blocks
==9512==         suppressed: 0 bytes in 0 blocks
==9512== Rerun with --leak-check=full to see details of leaked memory
==9512== 
==9512== Use --track-origins=yes to see where uninitialised values come from
==9512== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9512== 
==9512== 1 errors in context 1 of 2:
==9512== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9512==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9512==    by 0x488CD0: stringsubst (subst.c:301)
==9512==    by 0x48801B: prefork (subst.c:77)
==9512==    by 0x42B318: execcmd (exec.c:2619)
==9512==    by 0x428CA0: execpline2 (exec.c:1697)
==9512==    by 0x427FD2: execpline (exec.c:1484)
==9512==    by 0x427756: execlist (exec.c:1267)
==9512==    by 0x42717C: execode (exec.c:1073)
==9512==    by 0x431299: runshfunc (exec.c:5040)
==9512==    by 0x430E76: doshfunc (exec.c:4920)
==9512==    by 0x4302FB: execshfunc (exec.c:4557)
==9512==    by 0x42D8C1: execcmd (exec.c:3373)
==9512== 
==9512== 
==9512== 2 errors in context 2 of 2:
==9512== Conditional jump or move depends on uninitialised value(s)
==9512==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9512==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9512==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9512==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9512==    by 0x42D8E9: execcmd (exec.c:3378)
==9512==    by 0x428CA0: execpline2 (exec.c:1697)
==9512==    by 0x427FD2: execpline (exec.c:1484)
==9512==    by 0x42779A: execlist (exec.c:1275)
==9512==    by 0x42717C: execode (exec.c:1073)
==9512==    by 0x431299: runshfunc (exec.c:5040)
==9512==    by 0x430E76: doshfunc (exec.c:4920)
==9512==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9512== 
==9512== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF616C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFEBCDC,  len 4
==9517== Checked 4,830,936 bytes
==9517== 
client request: code 4d430005,  addr 0xFFEFEAB9C,  len 4
==9517== LEAK SUMMARY:
==9517==    definitely lost: 1,533 bytes in 8 blocks
==9517==    indirectly lost: 6,756 bytes in 7 blocks
==9517==      possibly lost: 0 bytes in 0 blocks
==9517==    still reachable: 3,152,705 bytes in 69,829 blocks
==9517==         suppressed: 0 bytes in 0 blocks
==9517== Rerun with --leak-check=full to see details of leaked memory
==9517== 
==9517== Use --track-origins=yes to see where uninitialised values come from
==9517== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9517== 
==9517== 1 errors in context 1 of 2:
==9517== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9517==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9517==    by 0x488CD0: stringsubst (subst.c:301)
==9517==    by 0x48801B: prefork (subst.c:77)
==9517==    by 0x42B318: execcmd (exec.c:2619)
==9517==    by 0x428CA0: execpline2 (exec.c:1697)
==9517==    by 0x427FD2: execpline (exec.c:1484)
==9517==    by 0x427756: execlist (exec.c:1267)
==9517==    by 0x42717C: execode (exec.c:1073)
==9517==    by 0x431299: runshfunc (exec.c:5040)
==9517==    by 0x430E76: doshfunc (exec.c:4920)
==9517==    by 0x4302FB: execshfunc (exec.c:4557)
==9517==    by 0x42D8C1: execcmd (exec.c:3373)
==9517== 
==9517== 
==9517== 2 errors in context 2 of 2:
==9517== Conditional jump or move depends on uninitialised value(s)
==9517==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9517==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9517==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9517==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9517==    by 0x42D8E9: execcmd (exec.c:3378)
==9517==    by 0x428CA0: execpline2 (exec.c:1697)
==9517==    by 0x427FD2: execpline (exec.c:1484)
==9517==    by 0x42779A: execlist (exec.c:1275)
==9517==    by 0x42717C: execode (exec.c:1073)
==9517==    by 0x431299: runshfunc (exec.c:5040)
==9517==    by 0x430E76: doshfunc (exec.c:4920)
==9517==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9517== 
==9517== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9519-- Caught __NR_exit; running __libc_freeres()
==9519== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9519-by-pythonnut-on-???
==9519== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9519-by-pythonnut-on-???
==9519== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9519-by-pythonnut-on-???
==9519== 
==9519== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9519== don't want to do, unless you know exactly what you're doing,
==9519== or are doing some strange experiment):
==9519==   /usr/lib/valgrind/../../bin/vgdb --pid=9519 ...command...
==9519== 
==9519== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9519==   /path/to/gdb ./zsh
==9519== and then give GDB the following command
==9519==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9519
==9519== --pid is optional if only one valgrind process is running
==9519== 
==9521== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9521-by-pythonnut-on-???
==9521== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9521-by-pythonnut-on-???
==9521== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9521-by-pythonnut-on-???
==9521== 
==9521== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9521== don't want to do, unless you know exactly what you're doing,
==9521== or are doing some strange experiment):
==9521==   /usr/lib/valgrind/../../bin/vgdb --pid=9521 ...command...
==9521== 
==9521== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9521==   /path/to/gdb ./zsh
==9521== and then give GDB the following command
==9521==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9521
==9521== --pid is optional if only one valgrind process is running
==9521== 
--9521-- Caught __NR_exit; running __libc_freeres()
--9519-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9519== 
==9519== HEAP SUMMARY:
==9519==     in use at exit: 3,167,384 bytes in 69,579 blocks
==9519==   total heap usage: 940,481 allocs, 870,902 frees, 68,290,480 bytes allocated
==9519== 
--9521-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9521== 
==9521== HEAP SUMMARY:
==9521==     in use at exit: 3,160,698 bytes in 69,835 blocks
==9521==   total heap usage: 1,047,550 allocs, 977,715 frees, 71,886,214 bytes allocated
==9521== 
==9519== Searching for pointers to 69,579 not-freed blocks
--9519--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9519--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9519--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9519--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9519--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9519--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9519--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9519--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9519--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9519--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9519--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9519--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9519--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9519--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9519--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9519--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9519--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9519--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9519--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9519--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9519--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9519--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9519--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9519--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9519--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9519--   Scanning root segment: 0x701a000..0x701afff (4096)
--9519--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9519--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9519--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9519--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9519--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9519--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9519--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9519--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9519--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9521== Searching for pointers to 69,835 not-freed blocks
--9521--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9521--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9521--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9521--   Scanning root segment: 0x4037000..0x403afff (16384)
--9521--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9521--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9521--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9521--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9521--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9521--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9521--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9521--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9521--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9521--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9521--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9521--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9521--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9521--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9521--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9521--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9521--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9521--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9521--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9521--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9521--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9521--   Scanning root segment: 0x701a000..0x701afff (4096)
--9521--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9521--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9521--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9521--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9521--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9521--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9521--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9521--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9521--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9519== Checked 4,885,760 bytes
==9519== 
==9521== Checked 4,831,384 bytes
==9521== 
==9519== LEAK SUMMARY:
==9519==    definitely lost: 1,533 bytes in 8 blocks
==9519==    indirectly lost: 6,756 bytes in 7 blocks
==9519==      possibly lost: 0 bytes in 0 blocks
==9519==    still reachable: 3,159,095 bytes in 69,564 blocks
==9519==         suppressed: 0 bytes in 0 blocks
==9519== Rerun with --leak-check=full to see details of leaked memory
==9519== 
==9519== Use --track-origins=yes to see where uninitialised values come from
==9519== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9519== 
==9519== 1 errors in context 1 of 2:
==9519== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9519==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9519==    by 0x488CD0: stringsubst (subst.c:301)
==9519==    by 0x48801B: prefork (subst.c:77)
==9519==    by 0x42B318: execcmd (exec.c:2619)
==9519==    by 0x428CA0: execpline2 (exec.c:1697)
==9519==    by 0x427FD2: execpline (exec.c:1484)
==9519==    by 0x427756: execlist (exec.c:1267)
==9519==    by 0x42717C: execode (exec.c:1073)
==9519==    by 0x431299: runshfunc (exec.c:5040)
==9519==    by 0x430E76: doshfunc (exec.c:4920)
==9519==    by 0x4302FB: execshfunc (exec.c:4557)
==9519==    by 0x42D8C1: execcmd (exec.c:3373)
==9519== 
==9519== 
==9519== 2 errors in context 2 of 2:
==9519== Conditional jump or move depends on uninitialised value(s)
==9519==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9519==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9519==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9519==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9519==    by 0x42D8E9: execcmd (exec.c:3378)
==9519==    by 0x428CA0: execpline2 (exec.c:1697)
==9519==    by 0x427FD2: execpline (exec.c:1484)
==9519==    by 0x42779A: execlist (exec.c:1275)
==9519==    by 0x42717C: execode (exec.c:1073)
==9519==    by 0x431299: runshfunc (exec.c:5040)
==9519==    by 0x430E76: doshfunc (exec.c:4920)
==9519==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9519== 
==9519== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9521== LEAK SUMMARY:
==9521==    definitely lost: 1,533 bytes in 8 blocks
==9521==    indirectly lost: 6,756 bytes in 7 blocks
==9521==      possibly lost: 0 bytes in 0 blocks
==9521==    still reachable: 3,152,409 bytes in 69,820 blocks
==9521==         suppressed: 0 bytes in 0 blocks
==9521== Rerun with --leak-check=full to see details of leaked memory
==9521== 
==9521== Use --track-origins=yes to see where uninitialised values come from
==9521== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9521== 
==9521== 1 errors in context 1 of 2:
==9521== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9521==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9521==    by 0x488CD0: stringsubst (subst.c:301)
==9521==    by 0x48801B: prefork (subst.c:77)
==9521==    by 0x42B318: execcmd (exec.c:2619)
==9521==    by 0x428CA0: execpline2 (exec.c:1697)
==9521==    by 0x427FD2: execpline (exec.c:1484)
==9521==    by 0x427756: execlist (exec.c:1267)
==9521==    by 0x42717C: execode (exec.c:1073)
==9521==    by 0x431299: runshfunc (exec.c:5040)
==9521==    by 0x430E76: doshfunc (exec.c:4920)
==9521==    by 0x4302FB: execshfunc (exec.c:4557)
==9521==    by 0x42D8C1: execcmd (exec.c:3373)
==9521== 
==9521== 
==9521== 2 errors in context 2 of 2:
==9521== Conditional jump or move depends on uninitialised value(s)
==9521==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9521==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9521==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9521==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9521==    by 0x42D8E9: execcmd (exec.c:3378)
==9521==    by 0x428CA0: execpline2 (exec.c:1697)
==9521==    by 0x427FD2: execpline (exec.c:1484)
==9521==    by 0x42779A: execlist (exec.c:1275)
==9521==    by 0x42717C: execode (exec.c:1073)
==9521==    by 0x431299: runshfunc (exec.c:5040)
==9521==    by 0x430E76: doshfunc (exec.c:4920)
==9521==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9521== 
==9521== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9523-- Caught __NR_exit; running __libc_freeres()
==9523== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9523-by-pythonnut-on-???
==9523== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9523-by-pythonnut-on-???
==9523== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9523-by-pythonnut-on-???
==9523== 
==9523== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9523== don't want to do, unless you know exactly what you're doing,
==9523== or are doing some strange experiment):
==9523==   /usr/lib/valgrind/../../bin/vgdb --pid=9523 ...command...
==9523== 
==9523== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9523==   /path/to/gdb ./zsh
==9523== and then give GDB the following command
==9523==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9523
==9523== --pid is optional if only one valgrind process is running
==9523== 
client request: code 4d430005,  addr 0xFFEFEA33C,  len 4
--9523-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9523== 
==9523== HEAP SUMMARY:
==9523==     in use at exit: 3,167,540 bytes in 69,585 blocks
==9523==   total heap usage: 940,490 allocs, 870,905 frees, 68,292,476 bytes allocated
==9523== 
==9523== Searching for pointers to 69,585 not-freed blocks
--9523--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9523--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9523--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9523--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9523--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9523--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9523--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9523--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9523--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9523--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9523--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9523--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9523--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9523--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9523--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9523--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9523--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9523--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9523--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9523--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9523--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9523--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9523--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9523--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9523--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9523--   Scanning root segment: 0x701a000..0x701afff (4096)
--9523--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9523--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9523--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9523--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9523--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9523--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9523--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9523--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9523--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9523== Checked 4,887,040 bytes
==9523== 
==9523== LEAK SUMMARY:
==9523==    definitely lost: 1,533 bytes in 8 blocks
==9523==    indirectly lost: 6,756 bytes in 7 blocks
==9523==      possibly lost: 0 bytes in 0 blocks
==9523==    still reachable: 3,159,251 bytes in 69,570 blocks
==9523==         suppressed: 0 bytes in 0 blocks
==9523== Rerun with --leak-check=full to see details of leaked memory
==9523== 
==9523== Use --track-origins=yes to see where uninitialised values come from
==9523== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9523== 
==9523== 1 errors in context 1 of 2:
==9523== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9523==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9523==    by 0x488CD0: stringsubst (subst.c:301)
==9523==    by 0x48801B: prefork (subst.c:77)
==9523==    by 0x42B318: execcmd (exec.c:2619)
==9523==    by 0x428CA0: execpline2 (exec.c:1697)
==9523==    by 0x427FD2: execpline (exec.c:1484)
==9523==    by 0x427756: execlist (exec.c:1267)
==9523==    by 0x42717C: execode (exec.c:1073)
==9523==    by 0x431299: runshfunc (exec.c:5040)
==9523==    by 0x430E76: doshfunc (exec.c:4920)
==9523==    by 0x4302FB: execshfunc (exec.c:4557)
==9523==    by 0x42D8C1: execcmd (exec.c:3373)
==9523== 
==9523== 
==9523== 2 errors in context 2 of 2:
==9523== Conditional jump or move depends on uninitialised value(s)
==9523==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9523==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9523==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9523==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9523==    by 0x42D8E9: execcmd (exec.c:3378)
==9523==    by 0x428CA0: execpline2 (exec.c:1697)
==9523==    by 0x427FD2: execpline (exec.c:1484)
==9523==    by 0x42779A: execlist (exec.c:1275)
==9523==    by 0x42717C: execode (exec.c:1073)
==9523==    by 0x431299: runshfunc (exec.c:5040)
==9523==    by 0x430E76: doshfunc (exec.c:4920)
==9523==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9523== 
==9523== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9522-- Caught __NR_exit; running __libc_freeres()
==9522== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9522-by-pythonnut-on-???
==9522== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9522-by-pythonnut-on-???
==9522== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9522-by-pythonnut-on-???
==9522== 
==9522== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9522== don't want to do, unless you know exactly what you're doing,
==9522== or are doing some strange experiment):
==9522==   /usr/lib/valgrind/../../bin/vgdb --pid=9522 ...command...
==9522== 
==9522== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9522==   /path/to/gdb ./zsh
==9522== and then give GDB the following command
==9522==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9522
==9522== --pid is optional if only one valgrind process is running
==9522== 
--9522-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9522== 
==9522== HEAP SUMMARY:
==9522==     in use at exit: 3,167,476 bytes in 69,582 blocks
==9522==   total heap usage: 940,492 allocs, 870,910 frees, 68,293,020 bytes allocated
==9522== 
==9522== Searching for pointers to 69,582 not-freed blocks
--9522--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9522--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9522--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9522--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9522--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9522--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9522--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9522--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9522--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9522--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9522--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9522--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9522--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9522--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9522--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9522--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9522--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9522--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9522--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9522--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9522--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9522--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9522--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9522--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9522--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9522--   Scanning root segment: 0x701a000..0x701afff (4096)
--9522--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9522--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9522--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9522--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9522--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9522--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9522--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9522--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9522--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9522== Checked 4,886,352 bytes
==9522== 
==9522== LEAK SUMMARY:
==9522==    definitely lost: 1,533 bytes in 8 blocks
==9522==    indirectly lost: 6,756 bytes in 7 blocks
==9522==      possibly lost: 0 bytes in 0 blocks
==9522==    still reachable: 3,159,187 bytes in 69,567 blocks
==9522==         suppressed: 0 bytes in 0 blocks
==9522== Rerun with --leak-check=full to see details of leaked memory
==9522== 
==9522== Use --track-origins=yes to see where uninitialised values come from
==9522== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9522== 
==9522== 1 errors in context 1 of 2:
==9522== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9522==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9522==    by 0x488CD0: stringsubst (subst.c:301)
==9522==    by 0x48801B: prefork (subst.c:77)
==9522==    by 0x42B318: execcmd (exec.c:2619)
==9522==    by 0x428CA0: execpline2 (exec.c:1697)
==9522==    by 0x427FD2: execpline (exec.c:1484)
==9522==    by 0x427756: execlist (exec.c:1267)
==9522==    by 0x42717C: execode (exec.c:1073)
==9522==    by 0x431299: runshfunc (exec.c:5040)
==9522==    by 0x430E76: doshfunc (exec.c:4920)
==9522==    by 0x4302FB: execshfunc (exec.c:4557)
==9522==    by 0x42D8C1: execcmd (exec.c:3373)
==9522== 
==9522== 
==9522== 2 errors in context 2 of 2:
==9522== Conditional jump or move depends on uninitialised value(s)
==9522==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9522==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9522==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9522==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9522==    by 0x42D8E9: execcmd (exec.c:3378)
==9522==    by 0x428CA0: execpline2 (exec.c:1697)
==9522==    by 0x427FD2: execpline (exec.c:1484)
==9522==    by 0x42779A: execlist (exec.c:1275)
==9522==    by 0x42717C: execode (exec.c:1073)
==9522==    by 0x431299: runshfunc (exec.c:5040)
==9522==    by 0x430E76: doshfunc (exec.c:4920)
==9522==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9522== 
==9522== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9526-- Caught __NR_exit; running __libc_freeres()
==9526== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9526-by-pythonnut-on-???
==9526== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9526-by-pythonnut-on-???
==9526== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9526-by-pythonnut-on-???
==9526== 
==9526== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9526== don't want to do, unless you know exactly what you're doing,
==9526== or are doing some strange experiment):
==9526==   /usr/lib/valgrind/../../bin/vgdb --pid=9526 ...command...
==9526== 
==9526== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9526==   /path/to/gdb ./zsh
==9526== and then give GDB the following command
==9526==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9526
==9526== --pid is optional if only one valgrind process is running
==9526== 
client request: code 4d430005,  addr 0xFFEFE9B7C,  len 4
--9526-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9526== 
==9526== HEAP SUMMARY:
==9526==     in use at exit: 3,167,637 bytes in 69,588 blocks
==9526==   total heap usage: 940,497 allocs, 870,909 frees, 68,294,685 bytes allocated
==9526== 
==9526== Searching for pointers to 69,588 not-freed blocks
--9526--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9526--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9526--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9526--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9526--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9526--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9526--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9526--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9526--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9526--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9526--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9526--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9526--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9526--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9526--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9526--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9526--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9526--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9526--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9526--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9526--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9526--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9526--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9526--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9526--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9526--   Scanning root segment: 0x701a000..0x701afff (4096)
--9526--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9526--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9526--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9526--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9526--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9526--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9526--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9526--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9526--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9526== Checked 4,887,640 bytes
==9526== 
==9526== LEAK SUMMARY:
==9526==    definitely lost: 1,533 bytes in 8 blocks
==9526==    indirectly lost: 6,756 bytes in 7 blocks
==9526==      possibly lost: 0 bytes in 0 blocks
==9526==    still reachable: 3,159,348 bytes in 69,573 blocks
==9526==         suppressed: 0 bytes in 0 blocks
==9526== Rerun with --leak-check=full to see details of leaked memory
==9526== 
==9526== Use --track-origins=yes to see where uninitialised values come from
==9526== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9526== 
==9526== 1 errors in context 1 of 2:
==9526== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9526==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9526==    by 0x488CD0: stringsubst (subst.c:301)
==9526==    by 0x48801B: prefork (subst.c:77)
==9526==    by 0x42B318: execcmd (exec.c:2619)
==9526==    by 0x428CA0: execpline2 (exec.c:1697)
==9526==    by 0x427FD2: execpline (exec.c:1484)
==9526==    by 0x427756: execlist (exec.c:1267)
==9526==    by 0x42717C: execode (exec.c:1073)
==9526==    by 0x431299: runshfunc (exec.c:5040)
==9526==    by 0x430E76: doshfunc (exec.c:4920)
==9526==    by 0x4302FB: execshfunc (exec.c:4557)
==9526==    by 0x42D8C1: execcmd (exec.c:3373)
==9526== 
==9526== 
==9526== 2 errors in context 2 of 2:
==9526== Conditional jump or move depends on uninitialised value(s)
==9526==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9526==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9526==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9526==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9526==    by 0x42D8E9: execcmd (exec.c:3378)
==9526==    by 0x428CA0: execpline2 (exec.c:1697)
==9526==    by 0x427FD2: execpline (exec.c:1484)
==9526==    by 0x42779A: execlist (exec.c:1275)
==9526==    by 0x42717C: execode (exec.c:1073)
==9526==    by 0x431299: runshfunc (exec.c:5040)
==9526==    by 0x430E76: doshfunc (exec.c:4920)
==9526==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9526== 
==9526== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9525-- Caught __NR_exit; running __libc_freeres()
==9525== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9525-by-pythonnut-on-???
==9525== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9525-by-pythonnut-on-???
==9525== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9525-by-pythonnut-on-???
==9525== 
==9525== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9525== don't want to do, unless you know exactly what you're doing,
==9525== or are doing some strange experiment):
==9525==   /usr/lib/valgrind/../../bin/vgdb --pid=9525 ...command...
==9525== 
==9525== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9525==   /path/to/gdb ./zsh
==9525== and then give GDB the following command
==9525==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9525
==9525== --pid is optional if only one valgrind process is running
==9525== 
--9525-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9525== 
==9525== HEAP SUMMARY:
==9525==     in use at exit: 3,167,573 bytes in 69,585 blocks
==9525==   total heap usage: 940,499 allocs, 870,914 frees, 68,295,229 bytes allocated
==9525== 
==9525== Searching for pointers to 69,585 not-freed blocks
--9525--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9525--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9525--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9525--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9525--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9525--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9525--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9525--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9525--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9525--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9525--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9525--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9525--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9525--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9525--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9525--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9525--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9525--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9525--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9525--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9525--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9525--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9525--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9525--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9525--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9525--   Scanning root segment: 0x701a000..0x701afff (4096)
--9525--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9525--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9525--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9525--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9525--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9525--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9525--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9525--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9525--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9525== Checked 4,886,960 bytes
==9525== 
==9525== LEAK SUMMARY:
==9525==    definitely lost: 1,533 bytes in 8 blocks
==9525==    indirectly lost: 6,756 bytes in 7 blocks
==9525==      possibly lost: 0 bytes in 0 blocks
==9525==    still reachable: 3,159,284 bytes in 69,570 blocks
==9525==         suppressed: 0 bytes in 0 blocks
==9525== Rerun with --leak-check=full to see details of leaked memory
==9525== 
==9525== Use --track-origins=yes to see where uninitialised values come from
==9525== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9525== 
==9525== 1 errors in context 1 of 2:
==9525== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9525==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9525==    by 0x488CD0: stringsubst (subst.c:301)
==9525==    by 0x48801B: prefork (subst.c:77)
==9525==    by 0x42B318: execcmd (exec.c:2619)
==9525==    by 0x428CA0: execpline2 (exec.c:1697)
==9525==    by 0x427FD2: execpline (exec.c:1484)
==9525==    by 0x427756: execlist (exec.c:1267)
==9525==    by 0x42717C: execode (exec.c:1073)
==9525==    by 0x431299: runshfunc (exec.c:5040)
==9525==    by 0x430E76: doshfunc (exec.c:4920)
==9525==    by 0x4302FB: execshfunc (exec.c:4557)
==9525==    by 0x42D8C1: execcmd (exec.c:3373)
==9525== 
==9525== 
==9525== 2 errors in context 2 of 2:
==9525== Conditional jump or move depends on uninitialised value(s)
==9525==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9525==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9525==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9525==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9525==    by 0x42D8E9: execcmd (exec.c:3378)
==9525==    by 0x428CA0: execpline2 (exec.c:1697)
==9525==    by 0x427FD2: execpline (exec.c:1484)
==9525==    by 0x42779A: execlist (exec.c:1275)
==9525==    by 0x42717C: execode (exec.c:1073)
==9525==    by 0x431299: runshfunc (exec.c:5040)
==9525==    by 0x430E76: doshfunc (exec.c:4920)
==9525==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9525== 
==9525== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF992C,  len 4
client request: code 4d430005,  addr 0xFFEFF87DC,  len 4
client request: code 4d430005,  addr 0xFFEFFB6EC,  len 4
--9490-- Caught __NR_exit; running __libc_freeres()
--9490-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9490== 
==9490== HEAP SUMMARY:
==9490==     in use at exit: 3,145,894 bytes in 69,103 blocks
==9490==   total heap usage: 940,587 allocs, 871,484 frees, 68,311,928 bytes allocated
==9490== 
==9490== Searching for pointers to 69,103 not-freed blocks
--9490--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9490--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9490--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9490--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9490--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9490--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9490--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9490--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9490--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9490--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9490--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9490--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9490--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9490--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9490--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9490--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9490--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9490--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9490--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9490--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9490--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9490--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9490--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9490--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9490--   Scanning root segment: 0x701a000..0x701afff (4096)
--9490--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9490--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9490--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9490--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9490--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9490--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9490--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9490--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9490--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9490== Checked 4,789,136 bytes
==9490== 
==9490== LEAK SUMMARY:
==9490==    definitely lost: 1,533 bytes in 8 blocks
==9490==    indirectly lost: 6,756 bytes in 7 blocks
==9490==      possibly lost: 0 bytes in 0 blocks
==9490==    still reachable: 3,137,605 bytes in 69,088 blocks
==9490==         suppressed: 0 bytes in 0 blocks
==9490== Rerun with --leak-check=full to see details of leaked memory
==9490== 
==9490== Use --track-origins=yes to see where uninitialised values come from
==9490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9490== 
==9490== 1 errors in context 1 of 2:
==9490== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9490==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9490==    by 0x488CD0: stringsubst (subst.c:301)
==9490==    by 0x48801B: prefork (subst.c:77)
==9490==    by 0x42B318: execcmd (exec.c:2619)
==9490==    by 0x428CA0: execpline2 (exec.c:1697)
==9490==    by 0x427FD2: execpline (exec.c:1484)
==9490==    by 0x427756: execlist (exec.c:1267)
==9490==    by 0x42717C: execode (exec.c:1073)
==9490==    by 0x431299: runshfunc (exec.c:5040)
==9490==    by 0x430E76: doshfunc (exec.c:4920)
==9490==    by 0x4302FB: execshfunc (exec.c:4557)
==9490==    by 0x42D8C1: execcmd (exec.c:3373)
==9490== 
==9490== 
==9490== 2 errors in context 2 of 2:
==9490== Conditional jump or move depends on uninitialised value(s)
==9490==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9490==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9490==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9490==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9490==    by 0x42D8E9: execcmd (exec.c:3378)
==9490==    by 0x428CA0: execpline2 (exec.c:1697)
==9490==    by 0x427FD2: execpline (exec.c:1484)
==9490==    by 0x42779A: execlist (exec.c:1275)
==9490==    by 0x42717C: execode (exec.c:1073)
==9490==    by 0x431299: runshfunc (exec.c:5040)
==9490==    by 0x430E76: doshfunc (exec.c:4920)
==9490==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9490== 
==9490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9485-- Caught __NR_exit; running __libc_freeres()
--9485-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9485== 
==9485== HEAP SUMMARY:
==9485==     in use at exit: 3,115,806 bytes in 68,874 blocks
==9485==   total heap usage: 935,481 allocs, 866,607 frees, 66,578,929 bytes allocated
==9485== 
==9485== Searching for pointers to 68,874 not-freed blocks
--9485--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9485--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9485--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9485--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9485--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9485--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9485--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9485--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9485--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9485--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9485--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9485--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9485--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9485--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9485--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9485--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9485--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9485--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9485--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9485--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9485--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9485--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9485--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9485--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9485--   Scanning root segment: 0x701a000..0x701afff (4096)
--9485--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9485--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9485--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9485--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9485--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9485--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9485--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9485--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9485--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9485== Checked 4,757,928 bytes
==9485== 
==9485== LEAK SUMMARY:
==9485==    definitely lost: 1,533 bytes in 8 blocks
==9485==    indirectly lost: 6,756 bytes in 7 blocks
==9485==      possibly lost: 0 bytes in 0 blocks
==9485==    still reachable: 3,107,517 bytes in 68,859 blocks
==9485==         suppressed: 0 bytes in 0 blocks
==9485== Rerun with --leak-check=full to see details of leaked memory
==9485== 
==9485== Use --track-origins=yes to see where uninitialised values come from
==9485== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9485== 
==9485== 1 errors in context 1 of 2:
==9485== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9485==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9485==    by 0x488CD0: stringsubst (subst.c:301)
==9485==    by 0x48801B: prefork (subst.c:77)
==9485==    by 0x42B318: execcmd (exec.c:2619)
==9485==    by 0x428CA0: execpline2 (exec.c:1697)
==9485==    by 0x427FD2: execpline (exec.c:1484)
==9485==    by 0x427756: execlist (exec.c:1267)
==9485==    by 0x42717C: execode (exec.c:1073)
==9485==    by 0x431299: runshfunc (exec.c:5040)
==9485==    by 0x430E76: doshfunc (exec.c:4920)
==9485==    by 0x4302FB: execshfunc (exec.c:4557)
==9485==    by 0x42D8C1: execcmd (exec.c:3373)
==9485== 
==9485== 
==9485== 2 errors in context 2 of 2:
==9485== Conditional jump or move depends on uninitialised value(s)
==9485==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9485==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9485==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9485==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9485==    by 0x42D8E9: execcmd (exec.c:3378)
==9485==    by 0x428CA0: execpline2 (exec.c:1697)
==9485==    by 0x427FD2: execpline (exec.c:1484)
==9485==    by 0x42779A: execlist (exec.c:1275)
==9485==    by 0x42717C: execode (exec.c:1073)
==9485==    by 0x431299: runshfunc (exec.c:5040)
==9485==    by 0x430E76: doshfunc (exec.c:4920)
==9485==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9485== 
==9485== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9395-- Caught __NR_exit; running __libc_freeres()
--9395-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9395== 
==9395== HEAP SUMMARY:
==9395==     in use at exit: 3,115,144 bytes in 68,861 blocks
==9395==   total heap usage: 935,521 allocs, 866,660 frees, 66,574,314 bytes allocated
==9395== 
client request: code 4d430005,  addr 0xFFEFE4DAC,  len 4
==9395== Searching for pointers to 68,861 not-freed blocks
--9395--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9395--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9395--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9395--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9395--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9395--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9395--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9395--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9395--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9395--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9395--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9395--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9395--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9395--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9395--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9395--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9395--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9395--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9395--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9395--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9395--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9395--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9395--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9395--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9395--   Scanning root segment: 0x701a000..0x701afff (4096)
--9395--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9395--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9395--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9395--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9395--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9395--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9395--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9395--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9395--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9531== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9531-by-pythonnut-on-???
==9531== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9531-by-pythonnut-on-???
==9531== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9531-by-pythonnut-on-???
==9531== 
==9531== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9531== don't want to do, unless you know exactly what you're doing,
==9531== or are doing some strange experiment):
==9531==   /usr/lib/valgrind/../../bin/vgdb --pid=9531 ...command...
==9531== 
==9531== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9531==   /path/to/gdb ./zsh
==9531== and then give GDB the following command
==9531==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9531
==9531== --pid is optional if only one valgrind process is running
==9531== 
--9531-- Caught __NR_exit; running __libc_freeres()
==9532== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9532-by-pythonnut-on-???
==9532== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9532-by-pythonnut-on-???
==9532== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9532-by-pythonnut-on-???
==9532== 
==9532== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9532== don't want to do, unless you know exactly what you're doing,
==9532== or are doing some strange experiment):
==9532==   /usr/lib/valgrind/../../bin/vgdb --pid=9532 ...command...
==9532== 
==9532== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9532==   /path/to/gdb ./zsh
==9532== and then give GDB the following command
==9532==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9532
==9532== --pid is optional if only one valgrind process is running
==9532== 
==9533== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9533-by-pythonnut-on-???
==9533== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9533-by-pythonnut-on-???
==9533== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9533-by-pythonnut-on-???
==9533== 
==9533== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9533== don't want to do, unless you know exactly what you're doing,
==9533== or are doing some strange experiment):
==9533==   /usr/lib/valgrind/../../bin/vgdb --pid=9533 ...command...
==9533== 
==9533== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9533==   /path/to/gdb ./zsh
==9533== and then give GDB the following command
==9533==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9533
==9533== --pid is optional if only one valgrind process is running
==9533== 
--9531-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9531== 
client request: code 4d430005,  addr 0xFFEFE56BC,  len 4
==9531== HEAP SUMMARY:
==9531==     in use at exit: 3,169,673 bytes in 70,004 blocks
==9531==   total heap usage: 1,078,773 allocs, 1,008,769 frees, 73,660,110 bytes allocated
==9531== 
==9531== Searching for pointers to 70,004 not-freed blocks
--9531--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9531--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9531--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9531--   Scanning root segment: 0x4037000..0x403afff (16384)
--9531--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9531--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9531--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9531--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9531--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9531--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9531--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9531--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9531--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9531--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9531--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9531--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9531--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9531--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9531--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9531--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9531--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9531--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9531--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9531--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9531--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9531--   Scanning root segment: 0x701a000..0x701afff (4096)
--9531--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9531--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9531--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9531--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9531--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9531--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9531--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9531--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9531--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9395== Checked 4,756,624 bytes
==9395== 
==9395== LEAK SUMMARY:
==9395==    definitely lost: 1,533 bytes in 8 blocks
==9395==    indirectly lost: 6,756 bytes in 7 blocks
==9395==      possibly lost: 0 bytes in 0 blocks
==9395==    still reachable: 3,106,855 bytes in 68,846 blocks
==9395==         suppressed: 0 bytes in 0 blocks
==9395== Rerun with --leak-check=full to see details of leaked memory
==9395== 
==9395== Use --track-origins=yes to see where uninitialised values come from
==9395== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9395== 
==9395== 1 errors in context 1 of 2:
==9395== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9395==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9395==    by 0x488CD0: stringsubst (subst.c:301)
==9395==    by 0x48801B: prefork (subst.c:77)
==9395==    by 0x42B318: execcmd (exec.c:2619)
==9395==    by 0x428CA0: execpline2 (exec.c:1697)
==9395==    by 0x427FD2: execpline (exec.c:1484)
==9395==    by 0x427756: execlist (exec.c:1267)
==9395==    by 0x42717C: execode (exec.c:1073)
==9395==    by 0x431299: runshfunc (exec.c:5040)
==9395==    by 0x430E76: doshfunc (exec.c:4920)
==9395==    by 0x4302FB: execshfunc (exec.c:4557)
==9395==    by 0x42D8C1: execcmd (exec.c:3373)
==9395== 
==9395== 
==9395== 2 errors in context 2 of 2:
==9395== Conditional jump or move depends on uninitialised value(s)
==9395==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9395==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9395==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9395==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9395==    by 0x42D8E9: execcmd (exec.c:3378)
==9395==    by 0x428CA0: execpline2 (exec.c:1697)
==9395==    by 0x427FD2: execpline (exec.c:1484)
==9395==    by 0x42779A: execlist (exec.c:1275)
==9395==    by 0x42717C: execode (exec.c:1073)
==9395==    by 0x431299: runshfunc (exec.c:5040)
==9395==    by 0x430E76: doshfunc (exec.c:4920)
==9395==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9395== 
==9395== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9531== Checked 4,840,544 bytes
==9531== 
==9531== LEAK SUMMARY:
==9531==    definitely lost: 1,533 bytes in 8 blocks
==9531==    indirectly lost: 6,756 bytes in 7 blocks
==9531==      possibly lost: 0 bytes in 0 blocks
==9531==    still reachable: 3,161,384 bytes in 69,989 blocks
==9531==         suppressed: 0 bytes in 0 blocks
==9531== Rerun with --leak-check=full to see details of leaked memory
==9531== 
==9531== Use --track-origins=yes to see where uninitialised values come from
==9531== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9531== 
==9531== 1 errors in context 1 of 2:
==9531== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9531==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9531==    by 0x488CD0: stringsubst (subst.c:301)
==9531==    by 0x48801B: prefork (subst.c:77)
==9531==    by 0x42B318: execcmd (exec.c:2619)
==9531==    by 0x428CA0: execpline2 (exec.c:1697)
==9531==    by 0x427FD2: execpline (exec.c:1484)
==9531==    by 0x427756: execlist (exec.c:1267)
==9531==    by 0x42717C: execode (exec.c:1073)
==9531==    by 0x431299: runshfunc (exec.c:5040)
==9531==    by 0x430E76: doshfunc (exec.c:4920)
==9531==    by 0x4302FB: execshfunc (exec.c:4557)
==9531==    by 0x42D8C1: execcmd (exec.c:3373)
==9531== 
==9531== 
==9531== 2 errors in context 2 of 2:
==9531== Conditional jump or move depends on uninitialised value(s)
==9531==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9531==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9531==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9531==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9531==    by 0x42D8E9: execcmd (exec.c:3378)
==9531==    by 0x428CA0: execpline2 (exec.c:1697)
==9531==    by 0x427FD2: execpline (exec.c:1484)
==9531==    by 0x42779A: execlist (exec.c:1275)
==9531==    by 0x42717C: execode (exec.c:1073)
==9531==    by 0x431299: runshfunc (exec.c:5040)
==9531==    by 0x430E76: doshfunc (exec.c:4920)
==9531==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9531== 
==9531== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9562== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9562-by-pythonnut-on-???
==9562== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9562-by-pythonnut-on-???
==9562== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9562-by-pythonnut-on-???
==9562== 
==9562== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9562== don't want to do, unless you know exactly what you're doing,
==9562== or are doing some strange experiment):
==9562==   /usr/lib/valgrind/../../bin/vgdb --pid=9562 ...command...
==9562== 
==9562== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9562==   /path/to/gdb ./zsh
==9562== and then give GDB the following command
==9562==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9562
==9562== --pid is optional if only one valgrind process is running
==9562== 
--9562-- Caught __NR_exit; running __libc_freeres()
--9562-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9562== 
==9562== HEAP SUMMARY:
==9562==     in use at exit: 3,265,454 bytes in 70,332 blocks
==9562==   total heap usage: 1,421,328 allocs, 1,350,996 frees, 111,871,987 bytes allocated
==9562== 
==9562== Searching for pointers to 70,332 not-freed blocks
--9562--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9562--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9562--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9562--   Scanning root segment: 0x4037000..0x403afff (16384)
--9562--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9562--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9562--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9562--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9562--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9562--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9562--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9562--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9562--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9562--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9562--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9562--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9562--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9562--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9562--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9562--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9562--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9562--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9562--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9562--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9562--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9562--   Scanning root segment: 0x701a000..0x701afff (4096)
--9562--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9562--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9562--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9562--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9562--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9562--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9562--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9562--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9562--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9562== Checked 4,929,784 bytes
==9562== 
==9562== LEAK SUMMARY:
==9562==    definitely lost: 1,533 bytes in 8 blocks
==9562==    indirectly lost: 6,756 bytes in 7 blocks
==9562==      possibly lost: 0 bytes in 0 blocks
==9562==    still reachable: 3,257,165 bytes in 70,317 blocks
==9562==         suppressed: 0 bytes in 0 blocks
==9562== Rerun with --leak-check=full to see details of leaked memory
==9562== 
==9562== Use --track-origins=yes to see where uninitialised values come from
==9562== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9562== 
==9562== 1 errors in context 1 of 2:
==9562== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9562==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9562==    by 0x488CD0: stringsubst (subst.c:301)
==9562==    by 0x48801B: prefork (subst.c:77)
==9562==    by 0x42B318: execcmd (exec.c:2619)
==9562==    by 0x428CA0: execpline2 (exec.c:1697)
==9562==    by 0x427FD2: execpline (exec.c:1484)
==9562==    by 0x427756: execlist (exec.c:1267)
==9562==    by 0x42717C: execode (exec.c:1073)
==9562==    by 0x431299: runshfunc (exec.c:5040)
==9562==    by 0x430E76: doshfunc (exec.c:4920)
==9562==    by 0x4302FB: execshfunc (exec.c:4557)
==9562==    by 0x42D8C1: execcmd (exec.c:3373)
==9562== 
==9562== 
==9562== 2 errors in context 2 of 2:
==9562== Conditional jump or move depends on uninitialised value(s)
==9562==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9562==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9562==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9562==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9562==    by 0x42D8E9: execcmd (exec.c:3378)
==9562==    by 0x428CA0: execpline2 (exec.c:1697)
==9562==    by 0x427FD2: execpline (exec.c:1484)
==9562==    by 0x42779A: execlist (exec.c:1275)
==9562==    by 0x42717C: execode (exec.c:1073)
==9562==    by 0x431299: runshfunc (exec.c:5040)
==9562==    by 0x430E76: doshfunc (exec.c:4920)
==9562==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9562== 
==9562== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9587== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9587-by-pythonnut-on-???
==9587== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9587-by-pythonnut-on-???
==9587== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9587-by-pythonnut-on-???
==9587== 
==9587== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9587== don't want to do, unless you know exactly what you're doing,
==9587== or are doing some strange experiment):
==9587==   /usr/lib/valgrind/../../bin/vgdb --pid=9587 ...command...
==9587== 
==9587== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9587==   /path/to/gdb ./zsh
==9587== and then give GDB the following command
==9587==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9587
==9587== --pid is optional if only one valgrind process is running
==9587== 
--9587-- Caught __NR_exit; running __libc_freeres()
--9587-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9587== 
==9587== HEAP SUMMARY:
==9587==     in use at exit: 3,163,879 bytes in 69,874 blocks
==9587==   total heap usage: 1,459,574 allocs, 1,389,700 frees, 117,370,069 bytes allocated
==9587== 
==9587== Searching for pointers to 69,874 not-freed blocks
--9587--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9587--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9587--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9587--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9587--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9587--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9587--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9587--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9587--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9587--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9587--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9587--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9587--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9587--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9587--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9587--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9587--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9587--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9587--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9587--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9587--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9587--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9587--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9587--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9587--   Scanning root segment: 0x701a000..0x701afff (4096)
--9587--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9587--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9587--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9587--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9587--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9587--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9587--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9587--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9587--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9587== Checked 4,804,040 bytes
==9587== 
==9587== LEAK SUMMARY:
==9587==    definitely lost: 2,181 bytes in 11 blocks
==9587==    indirectly lost: 6,756 bytes in 7 blocks
==9587==      possibly lost: 0 bytes in 0 blocks
==9587==    still reachable: 3,154,942 bytes in 69,856 blocks
==9587==         suppressed: 0 bytes in 0 blocks
==9587== Rerun with --leak-check=full to see details of leaked memory
==9587== 
==9587== Use --track-origins=yes to see where uninitialised values come from
==9587== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9587== 
==9587== 1 errors in context 1 of 2:
==9587== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9587==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9587==    by 0x488CD0: stringsubst (subst.c:301)
==9587==    by 0x48801B: prefork (subst.c:77)
==9587==    by 0x42B318: execcmd (exec.c:2619)
==9587==    by 0x428CA0: execpline2 (exec.c:1697)
==9587==    by 0x427FD2: execpline (exec.c:1484)
==9587==    by 0x427756: execlist (exec.c:1267)
==9587==    by 0x42717C: execode (exec.c:1073)
==9587==    by 0x431299: runshfunc (exec.c:5040)
==9587==    by 0x430E76: doshfunc (exec.c:4920)
==9587==    by 0x4302FB: execshfunc (exec.c:4557)
==9587==    by 0x42D8C1: execcmd (exec.c:3373)
==9587== 
==9587== 
==9587== 2 errors in context 2 of 2:
==9587== Conditional jump or move depends on uninitialised value(s)
==9587==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9587==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9587==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9587==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9587==    by 0x42D8E9: execcmd (exec.c:3378)
==9587==    by 0x428CA0: execpline2 (exec.c:1697)
==9587==    by 0x427FD2: execpline (exec.c:1484)
==9587==    by 0x42779A: execlist (exec.c:1275)
==9587==    by 0x42717C: execode (exec.c:1073)
==9587==    by 0x431299: runshfunc (exec.c:5040)
==9587==    by 0x430E76: doshfunc (exec.c:4920)
==9587==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9587== 
==9587== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9588== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9588-by-pythonnut-on-???
==9588== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9588-by-pythonnut-on-???
==9588== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9588-by-pythonnut-on-???
==9588== 
==9588== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9588== don't want to do, unless you know exactly what you're doing,
==9588== or are doing some strange experiment):
==9588==   /usr/lib/valgrind/../../bin/vgdb --pid=9588 ...command...
==9588== 
==9588== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9588==   /path/to/gdb ./zsh
==9588== and then give GDB the following command
==9588==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9588
==9588== --pid is optional if only one valgrind process is running
==9588== 
--9588-- Caught __NR_exit; running __libc_freeres()
--9588-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9588== 
==9588== HEAP SUMMARY:
==9588==     in use at exit: 3,163,686 bytes in 69,874 blocks
==9588==   total heap usage: 1,459,581 allocs, 1,389,707 frees, 117,373,093 bytes allocated
==9588== 
==9588== Searching for pointers to 69,874 not-freed blocks
--9588--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9588--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9588--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9588--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9588--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9588--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9588--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9588--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9588--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9588--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9588--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9588--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9588--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9588--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9588--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9588--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9588--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9588--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9588--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9588--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9588--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9588--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9588--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9588--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9588--   Scanning root segment: 0x701a000..0x701afff (4096)
--9588--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9588--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9588--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9588--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9588--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9588--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9588--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9588--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9588--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9588== Checked 4,805,200 bytes
==9588== 
==9588== LEAK SUMMARY:
==9588==    definitely lost: 2,181 bytes in 11 blocks
==9588==    indirectly lost: 6,756 bytes in 7 blocks
==9588==      possibly lost: 0 bytes in 0 blocks
==9588==    still reachable: 3,154,749 bytes in 69,856 blocks
==9588==         suppressed: 0 bytes in 0 blocks
==9588== Rerun with --leak-check=full to see details of leaked memory
==9588== 
==9588== Use --track-origins=yes to see where uninitialised values come from
==9588== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9588== 
==9588== 1 errors in context 1 of 2:
==9588== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9588==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9588==    by 0x488CD0: stringsubst (subst.c:301)
==9588==    by 0x48801B: prefork (subst.c:77)
==9588==    by 0x42B318: execcmd (exec.c:2619)
==9588==    by 0x428CA0: execpline2 (exec.c:1697)
==9588==    by 0x427FD2: execpline (exec.c:1484)
==9588==    by 0x427756: execlist (exec.c:1267)
==9588==    by 0x42717C: execode (exec.c:1073)
==9588==    by 0x431299: runshfunc (exec.c:5040)
==9588==    by 0x430E76: doshfunc (exec.c:4920)
==9588==    by 0x4302FB: execshfunc (exec.c:4557)
==9588==    by 0x42D8C1: execcmd (exec.c:3373)
==9588== 
==9588== 
==9588== 2 errors in context 2 of 2:
==9588== Conditional jump or move depends on uninitialised value(s)
==9588==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9588==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9588==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9588==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9588==    by 0x42D8E9: execcmd (exec.c:3378)
==9588==    by 0x428CA0: execpline2 (exec.c:1697)
==9588==    by 0x427FD2: execpline (exec.c:1484)
==9588==    by 0x42779A: execlist (exec.c:1275)
==9588==    by 0x42717C: execode (exec.c:1073)
==9588==    by 0x431299: runshfunc (exec.c:5040)
==9588==    by 0x430E76: doshfunc (exec.c:4920)
==9588==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9588== 
==9588== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9589== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9589-by-pythonnut-on-???
==9589== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9589-by-pythonnut-on-???
==9589== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9589-by-pythonnut-on-???
==9589== 
==9589== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9589== don't want to do, unless you know exactly what you're doing,
==9589== or are doing some strange experiment):
==9589==   /usr/lib/valgrind/../../bin/vgdb --pid=9589 ...command...
==9589== 
==9589== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9589==   /path/to/gdb ./zsh
==9589== and then give GDB the following command
==9589==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9589
==9589== --pid is optional if only one valgrind process is running
==9589== 
--9590-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9590== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9590-by-pythonnut-on-???
==9590== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9590-by-pythonnut-on-???
==9590== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9590-by-pythonnut-on-???
==9590== 
==9590== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9590== don't want to do, unless you know exactly what you're doing,
==9590== or are doing some strange experiment):
==9590==   /usr/lib/valgrind/../../bin/vgdb --pid=9590 ...command...
==9590== 
==9590== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9590==   /path/to/gdb ./zsh
==9590== and then give GDB the following command
==9590==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9590
==9590== --pid is optional if only one valgrind process is running
==9590== 
--9590-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9590== 
==9590== HEAP SUMMARY:
==9590==     in use at exit: 3,160,885 bytes in 69,804 blocks
==9590==   total heap usage: 1,459,798 allocs, 1,389,994 frees, 117,397,470 bytes allocated
==9590== 
==9590== Searching for pointers to 69,804 not-freed blocks
--9590--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9590--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9590--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9590--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9590--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9590--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9590--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9590--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9590--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9590--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9590--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9590--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9590--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9590--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9590--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9590--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9590--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9590--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9590--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9590--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9590--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9590--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9590--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9590--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9590--   Scanning root segment: 0x701a000..0x701afff (4096)
--9590--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9590--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9590--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9590--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9590--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9590--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9590--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9590--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9590--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9590== Checked 4,798,464 bytes
==9590== 
==9590== LEAK SUMMARY:
==9590==    definitely lost: 2,181 bytes in 11 blocks
==9590==    indirectly lost: 6,756 bytes in 7 blocks
==9590==      possibly lost: 0 bytes in 0 blocks
==9590==    still reachable: 3,151,948 bytes in 69,786 blocks
==9590==         suppressed: 0 bytes in 0 blocks
==9590== Rerun with --leak-check=full to see details of leaked memory
==9590== 
==9590== Use --track-origins=yes to see where uninitialised values come from
==9590== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9590== 
==9590== 1 errors in context 1 of 2:
==9590== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9590==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9590==    by 0x488CD0: stringsubst (subst.c:301)
==9590==    by 0x48801B: prefork (subst.c:77)
==9590==    by 0x42B318: execcmd (exec.c:2619)
==9590==    by 0x428CA0: execpline2 (exec.c:1697)
==9590==    by 0x427FD2: execpline (exec.c:1484)
==9590==    by 0x427756: execlist (exec.c:1267)
==9590==    by 0x42717C: execode (exec.c:1073)
==9590==    by 0x431299: runshfunc (exec.c:5040)
==9590==    by 0x430E76: doshfunc (exec.c:4920)
==9590==    by 0x4302FB: execshfunc (exec.c:4557)
==9590==    by 0x42D8C1: execcmd (exec.c:3373)
==9590== 
==9590== 
==9590== 2 errors in context 2 of 2:
==9590== Conditional jump or move depends on uninitialised value(s)
==9590==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9590==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9590==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9590==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9590==    by 0x42D8E9: execcmd (exec.c:3378)
==9590==    by 0x428CA0: execpline2 (exec.c:1697)
==9590==    by 0x427FD2: execpline (exec.c:1484)
==9590==    by 0x42779A: execlist (exec.c:1275)
==9590==    by 0x42717C: execode (exec.c:1073)
==9590==    by 0x431299: runshfunc (exec.c:5040)
==9590==    by 0x430E76: doshfunc (exec.c:4920)
==9590==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9590== 
==9590== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9589-- Caught __NR_exit; running __libc_freeres()
--9589-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9589== 
==9589== HEAP SUMMARY:
==9589==     in use at exit: 3,160,821 bytes in 69,801 blocks
==9589==   total heap usage: 1,459,796 allocs, 1,389,995 frees, 117,397,229 bytes allocated
==9589== 
==9589== Searching for pointers to 69,801 not-freed blocks
--9589--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9589--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9589--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9589--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9589--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9589--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9589--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9589--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9589--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9589--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9589--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9589--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9589--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9589--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9589--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9589--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9589--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9589--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9589--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9589--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9589--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9589--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9589--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9589--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9589--   Scanning root segment: 0x701a000..0x701afff (4096)
--9589--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9589--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9589--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9589--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9589--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9589--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9589--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9589--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9589--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9589== Checked 4,797,776 bytes
==9589== 
==9589== LEAK SUMMARY:
==9589==    definitely lost: 2,181 bytes in 11 blocks
==9589==    indirectly lost: 6,756 bytes in 7 blocks
==9589==      possibly lost: 0 bytes in 0 blocks
==9589==    still reachable: 3,151,884 bytes in 69,783 blocks
==9589==         suppressed: 0 bytes in 0 blocks
==9589== Rerun with --leak-check=full to see details of leaked memory
==9589== 
==9589== Use --track-origins=yes to see where uninitialised values come from
==9589== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9589== 
==9589== 1 errors in context 1 of 2:
==9589== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9589==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9589==    by 0x488CD0: stringsubst (subst.c:301)
==9589==    by 0x48801B: prefork (subst.c:77)
==9589==    by 0x42B318: execcmd (exec.c:2619)
==9589==    by 0x428CA0: execpline2 (exec.c:1697)
==9589==    by 0x427FD2: execpline (exec.c:1484)
==9589==    by 0x427756: execlist (exec.c:1267)
==9589==    by 0x42717C: execode (exec.c:1073)
==9589==    by 0x431299: runshfunc (exec.c:5040)
==9589==    by 0x430E76: doshfunc (exec.c:4920)
==9589==    by 0x4302FB: execshfunc (exec.c:4557)
==9589==    by 0x42D8C1: execcmd (exec.c:3373)
==9589== 
==9589== 
==9589== 2 errors in context 2 of 2:
==9589== Conditional jump or move depends on uninitialised value(s)
==9589==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9589==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9589==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9589==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9589==    by 0x42D8E9: execcmd (exec.c:3378)
==9589==    by 0x428CA0: execpline2 (exec.c:1697)
==9589==    by 0x427FD2: execpline (exec.c:1484)
==9589==    by 0x42779A: execlist (exec.c:1275)
==9589==    by 0x42717C: execode (exec.c:1073)
==9589==    by 0x431299: runshfunc (exec.c:5040)
==9589==    by 0x430E76: doshfunc (exec.c:4920)
==9589==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9589== 
==9589== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9594-- Caught __NR_exit; running __libc_freeres()
==9594== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9594-by-pythonnut-on-???
==9594== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9594-by-pythonnut-on-???
==9594== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9594-by-pythonnut-on-???
==9594== 
==9594== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9594== don't want to do, unless you know exactly what you're doing,
==9594== or are doing some strange experiment):
==9594==   /usr/lib/valgrind/../../bin/vgdb --pid=9594 ...command...
==9594== 
==9594== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9594==   /path/to/gdb ./zsh
==9594== and then give GDB the following command
==9594==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9594
==9594== --pid is optional if only one valgrind process is running
==9594== 
--9594-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9594== 
==9594== HEAP SUMMARY:
==9594==     in use at exit: 3,160,828 bytes in 69,801 blocks
==9594==   total heap usage: 1,459,811 allocs, 1,390,010 frees, 117,402,227 bytes allocated
==9594== 
==9594== Searching for pointers to 69,801 not-freed blocks
--9594--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9594--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9594--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9594--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9594--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9594--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9594--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9594--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9594--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9594--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9594--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9594--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9594--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9594--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9594--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9594--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9594--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9594--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9594--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9594--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9594--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9594--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9594--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9594--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9594--   Scanning root segment: 0x701a000..0x701afff (4096)
--9594--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9594--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9594--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9594--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9594--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9594--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9594--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9594--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9594--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9594== Checked 4,797,912 bytes
==9594== 
==9594== LEAK SUMMARY:
==9594==    definitely lost: 2,181 bytes in 11 blocks
==9594==    indirectly lost: 6,756 bytes in 7 blocks
==9594==      possibly lost: 0 bytes in 0 blocks
==9594==    still reachable: 3,151,891 bytes in 69,783 blocks
==9594==         suppressed: 0 bytes in 0 blocks
==9594== Rerun with --leak-check=full to see details of leaked memory
==9594== 
==9594== Use --track-origins=yes to see where uninitialised values come from
==9594== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9594== 
==9594== 1 errors in context 1 of 2:
==9594== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9594==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9594==    by 0x488CD0: stringsubst (subst.c:301)
==9594==    by 0x48801B: prefork (subst.c:77)
==9594==    by 0x42B318: execcmd (exec.c:2619)
==9594==    by 0x428CA0: execpline2 (exec.c:1697)
==9594==    by 0x427FD2: execpline (exec.c:1484)
==9594==    by 0x427756: execlist (exec.c:1267)
==9594==    by 0x42717C: execode (exec.c:1073)
==9594==    by 0x431299: runshfunc (exec.c:5040)
==9594==    by 0x430E76: doshfunc (exec.c:4920)
==9594==    by 0x4302FB: execshfunc (exec.c:4557)
==9594==    by 0x42D8C1: execcmd (exec.c:3373)
==9594== 
==9594== 
==9594== 2 errors in context 2 of 2:
==9594== Conditional jump or move depends on uninitialised value(s)
==9594==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9594==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9594==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9594==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9594==    by 0x42D8E9: execcmd (exec.c:3378)
==9594==    by 0x428CA0: execpline2 (exec.c:1697)
==9594==    by 0x427FD2: execpline (exec.c:1484)
==9594==    by 0x42779A: execlist (exec.c:1275)
==9594==    by 0x42717C: execode (exec.c:1073)
==9594==    by 0x431299: runshfunc (exec.c:5040)
==9594==    by 0x430E76: doshfunc (exec.c:4920)
==9594==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9594== 
==9594== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9595-- Caught __NR_exit; running __libc_freeres()
==9595== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9595-by-pythonnut-on-???
==9595== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9595-by-pythonnut-on-???
==9595== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9595-by-pythonnut-on-???
==9595== 
==9595== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9595== don't want to do, unless you know exactly what you're doing,
==9595== or are doing some strange experiment):
==9595==   /usr/lib/valgrind/../../bin/vgdb --pid=9595 ...command...
==9595== 
==9595== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9595==   /path/to/gdb ./zsh
==9595== and then give GDB the following command
==9595==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9595
==9595== --pid is optional if only one valgrind process is running
==9595== 
--9595-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9595== 
==9595== HEAP SUMMARY:
==9595==     in use at exit: 3,160,924 bytes in 69,801 blocks
==9595==   total heap usage: 1,459,827 allocs, 1,390,026 frees, 117,407,014 bytes allocated
==9595== 
==9595== Searching for pointers to 69,801 not-freed blocks
--9595--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9595--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9595--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9595--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9595--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9595--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9595--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9595--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9595--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9595--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9595--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9595--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9595--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9595--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9595--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9595--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9595--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9595--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9595--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9595--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9595--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9595--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9595--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9595--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9595--   Scanning root segment: 0x701a000..0x701afff (4096)
--9595--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9595--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9595--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9595--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9595--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9595--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9595--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9595--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9595--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9595== Checked 4,797,192 bytes
==9595== 
==9595== LEAK SUMMARY:
==9595==    definitely lost: 2,181 bytes in 11 blocks
==9595==    indirectly lost: 6,756 bytes in 7 blocks
==9595==      possibly lost: 0 bytes in 0 blocks
==9595==    still reachable: 3,151,987 bytes in 69,783 blocks
==9595==         suppressed: 0 bytes in 0 blocks
==9595== Rerun with --leak-check=full to see details of leaked memory
==9595== 
==9595== Use --track-origins=yes to see where uninitialised values come from
==9595== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9595== 
==9595== 1 errors in context 1 of 2:
==9595== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9595==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9595==    by 0x488CD0: stringsubst (subst.c:301)
==9595==    by 0x48801B: prefork (subst.c:77)
==9595==    by 0x42B318: execcmd (exec.c:2619)
==9595==    by 0x428CA0: execpline2 (exec.c:1697)
==9595==    by 0x427FD2: execpline (exec.c:1484)
==9595==    by 0x427756: execlist (exec.c:1267)
==9595==    by 0x42717C: execode (exec.c:1073)
==9595==    by 0x431299: runshfunc (exec.c:5040)
==9595==    by 0x430E76: doshfunc (exec.c:4920)
==9595==    by 0x4302FB: execshfunc (exec.c:4557)
==9595==    by 0x42D8C1: execcmd (exec.c:3373)
==9595== 
==9595== 
==9595== 2 errors in context 2 of 2:
==9595== Conditional jump or move depends on uninitialised value(s)
==9595==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9595==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9595==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9595==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9595==    by 0x42D8E9: execcmd (exec.c:3378)
==9595==    by 0x428CA0: execpline2 (exec.c:1697)
==9595==    by 0x427FD2: execpline (exec.c:1484)
==9595==    by 0x42779A: execlist (exec.c:1275)
==9595==    by 0x42717C: execode (exec.c:1073)
==9595==    by 0x431299: runshfunc (exec.c:5040)
==9595==    by 0x430E76: doshfunc (exec.c:4920)
==9595==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9595== 
==9595== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9596== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9596-by-pythonnut-on-???
==9596== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9596-by-pythonnut-on-???
==9596== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9596-by-pythonnut-on-???
==9596== 
==9596== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9596== don't want to do, unless you know exactly what you're doing,
==9596== or are doing some strange experiment):
==9596==   /usr/lib/valgrind/../../bin/vgdb --pid=9596 ...command...
==9596== 
==9596== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9596==   /path/to/gdb ./zsh
==9596== and then give GDB the following command
==9596==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9596
==9596== --pid is optional if only one valgrind process is running
==9596== 
--9596-- Caught __NR_exit; running __libc_freeres()
--9596-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9596== 
==9596== HEAP SUMMARY:
==9596==     in use at exit: 3,161,170 bytes in 69,807 blocks
==9596==   total heap usage: 1,459,875 allocs, 1,390,068 frees, 117,416,038 bytes allocated
==9596== 
==9596== Searching for pointers to 69,807 not-freed blocks
--9596--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9596--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9596--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9596--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9596--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9596--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9596--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9596--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9596--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9596--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9596--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9596--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9596--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9596--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9596--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9596--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9596--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9596--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9596--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9596--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9596--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9596--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9596--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9596--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9596--   Scanning root segment: 0x701a000..0x701afff (4096)
--9596--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9596--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9596--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9596--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9596--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9596--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9596--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9596--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9596--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9596== Checked 4,797,368 bytes
==9596== 
==9596== LEAK SUMMARY:
==9596==    definitely lost: 2,181 bytes in 11 blocks
==9596==    indirectly lost: 6,756 bytes in 7 blocks
==9596==      possibly lost: 0 bytes in 0 blocks
==9596==    still reachable: 3,152,233 bytes in 69,789 blocks
==9596==         suppressed: 0 bytes in 0 blocks
==9596== Rerun with --leak-check=full to see details of leaked memory
==9596== 
==9596== Use --track-origins=yes to see where uninitialised values come from
==9596== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9596== 
==9596== 1 errors in context 1 of 2:
==9596== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9596==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9596==    by 0x488CD0: stringsubst (subst.c:301)
==9596==    by 0x48801B: prefork (subst.c:77)
==9596==    by 0x42B318: execcmd (exec.c:2619)
==9596==    by 0x428CA0: execpline2 (exec.c:1697)
==9596==    by 0x427FD2: execpline (exec.c:1484)
==9596==    by 0x427756: execlist (exec.c:1267)
==9596==    by 0x42717C: execode (exec.c:1073)
==9596==    by 0x431299: runshfunc (exec.c:5040)
==9596==    by 0x430E76: doshfunc (exec.c:4920)
==9596==    by 0x4302FB: execshfunc (exec.c:4557)
==9596==    by 0x42D8C1: execcmd (exec.c:3373)
==9596== 
==9596== 
==9596== 2 errors in context 2 of 2:
==9596== Conditional jump or move depends on uninitialised value(s)
==9596==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9596==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9596==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9596==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9596==    by 0x42D8E9: execcmd (exec.c:3378)
==9596==    by 0x428CA0: execpline2 (exec.c:1697)
==9596==    by 0x427FD2: execpline (exec.c:1484)
==9596==    by 0x42779A: execlist (exec.c:1275)
==9596==    by 0x42717C: execode (exec.c:1073)
==9596==    by 0x431299: runshfunc (exec.c:5040)
==9596==    by 0x430E76: doshfunc (exec.c:4920)
==9596==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9596== 
==9596== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9597-- Caught __NR_exit; running __libc_freeres()
==9597== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9597-by-pythonnut-on-???
==9597== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9597-by-pythonnut-on-???
==9597== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9597-by-pythonnut-on-???
==9597== 
==9597== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9597== don't want to do, unless you know exactly what you're doing,
==9597== or are doing some strange experiment):
==9597==   /usr/lib/valgrind/../../bin/vgdb --pid=9597 ...command...
==9597== 
==9597== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9597==   /path/to/gdb ./zsh
==9597== and then give GDB the following command
==9597==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9597
==9597== --pid is optional if only one valgrind process is running
==9597== 
--9597-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9597== 
==9597== HEAP SUMMARY:
==9597==     in use at exit: 3,161,106 bytes in 69,807 blocks
==9597==   total heap usage: 1,459,855 allocs, 1,390,048 frees, 117,413,808 bytes allocated
==9597== 
==9597== Searching for pointers to 69,807 not-freed blocks
--9597--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9597--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9597--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9597--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9597--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9597--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9597--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9597--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9597--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9597--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9597--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9597--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9597--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9597--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9597--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9597--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9597--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9597--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9597--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9597--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9597--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9597--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9597--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9597--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9597--   Scanning root segment: 0x701a000..0x701afff (4096)
--9597--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9597--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9597--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9597--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9597--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9597--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9597--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9597--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9597--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9597== Checked 4,797,288 bytes
==9597== 
==9597== LEAK SUMMARY:
==9597==    definitely lost: 2,181 bytes in 11 blocks
==9597==    indirectly lost: 6,756 bytes in 7 blocks
==9597==      possibly lost: 0 bytes in 0 blocks
==9597==    still reachable: 3,152,169 bytes in 69,789 blocks
==9597==         suppressed: 0 bytes in 0 blocks
==9597== Rerun with --leak-check=full to see details of leaked memory
==9597== 
==9597== Use --track-origins=yes to see where uninitialised values come from
==9597== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9597== 
==9597== 1 errors in context 1 of 2:
==9597== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9597==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9597==    by 0x488CD0: stringsubst (subst.c:301)
==9597==    by 0x48801B: prefork (subst.c:77)
==9597==    by 0x42B318: execcmd (exec.c:2619)
==9597==    by 0x428CA0: execpline2 (exec.c:1697)
==9597==    by 0x427FD2: execpline (exec.c:1484)
==9597==    by 0x427756: execlist (exec.c:1267)
==9597==    by 0x42717C: execode (exec.c:1073)
==9597==    by 0x431299: runshfunc (exec.c:5040)
==9597==    by 0x430E76: doshfunc (exec.c:4920)
==9597==    by 0x4302FB: execshfunc (exec.c:4557)
==9597==    by 0x42D8C1: execcmd (exec.c:3373)
==9597== 
==9597== 
==9597== 2 errors in context 2 of 2:
==9597== Conditional jump or move depends on uninitialised value(s)
==9597==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9597==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9597==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9597==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9597==    by 0x42D8E9: execcmd (exec.c:3378)
==9597==    by 0x428CA0: execpline2 (exec.c:1697)
==9597==    by 0x427FD2: execpline (exec.c:1484)
==9597==    by 0x42779A: execlist (exec.c:1275)
==9597==    by 0x42717C: execode (exec.c:1073)
==9597==    by 0x431299: runshfunc (exec.c:5040)
==9597==    by 0x430E76: doshfunc (exec.c:4920)
==9597==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9597== 
==9597== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9598== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9598-by-pythonnut-on-???
==9598== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9598-by-pythonnut-on-???
==9598== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9598-by-pythonnut-on-???
==9598== 
==9598== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9598== don't want to do, unless you know exactly what you're doing,
==9598== or are doing some strange experiment):
==9598==   /usr/lib/valgrind/../../bin/vgdb --pid=9598 ...command...
==9598== 
==9598== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9598==   /path/to/gdb ./zsh
==9598== and then give GDB the following command
==9598==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9598
==9598== --pid is optional if only one valgrind process is running
==9598== 
--9598-- Caught __NR_exit; running __libc_freeres()
--9598-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9598== 
==9598== HEAP SUMMARY:
==9598==     in use at exit: 3,161,144 bytes in 69,808 blocks
==9598==   total heap usage: 1,459,868 allocs, 1,390,060 frees, 117,416,505 bytes allocated
==9598== 
==9598== Searching for pointers to 69,808 not-freed blocks
--9598--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9598--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9598--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9598--   Scanning root segment: 0x4037000..0x403afff (16384)
--9598--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9598--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9598--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9598--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9598--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9598--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9598--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9598--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9598--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9598--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9598--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9598--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9598--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9598--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9598--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9598--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9598--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9598--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9598--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9598--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9598--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9598--   Scanning root segment: 0x701a000..0x701afff (4096)
--9598--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9598--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9598--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9598--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9598--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9598--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9598--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9598--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9598--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9598== Checked 4,813,192 bytes
==9598== 
==9598== LEAK SUMMARY:
==9598==    definitely lost: 2,181 bytes in 11 blocks
==9598==    indirectly lost: 6,756 bytes in 7 blocks
==9598==      possibly lost: 0 bytes in 0 blocks
==9598==    still reachable: 3,152,207 bytes in 69,790 blocks
==9598==         suppressed: 0 bytes in 0 blocks
==9598== Rerun with --leak-check=full to see details of leaked memory
==9598== 
==9598== Use --track-origins=yes to see where uninitialised values come from
==9598== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9598== 
==9598== 1 errors in context 1 of 2:
==9598== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9598==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9598==    by 0x488CD0: stringsubst (subst.c:301)
==9598==    by 0x48801B: prefork (subst.c:77)
==9598==    by 0x42B318: execcmd (exec.c:2619)
==9598==    by 0x428CA0: execpline2 (exec.c:1697)
==9598==    by 0x427FD2: execpline (exec.c:1484)
==9598==    by 0x427756: execlist (exec.c:1267)
==9598==    by 0x42717C: execode (exec.c:1073)
==9598==    by 0x431299: runshfunc (exec.c:5040)
==9598==    by 0x430E76: doshfunc (exec.c:4920)
==9598==    by 0x4302FB: execshfunc (exec.c:4557)
==9598==    by 0x42D8C1: execcmd (exec.c:3373)
==9598== 
==9598== 
==9598== 2 errors in context 2 of 2:
==9598== Conditional jump or move depends on uninitialised value(s)
==9598==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9598==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9598==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9598==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9598==    by 0x42D8E9: execcmd (exec.c:3378)
==9598==    by 0x428CA0: execpline2 (exec.c:1697)
==9598==    by 0x427FD2: execpline (exec.c:1484)
==9598==    by 0x42779A: execlist (exec.c:1275)
==9598==    by 0x42717C: execode (exec.c:1073)
==9598==    by 0x431299: runshfunc (exec.c:5040)
==9598==    by 0x430E76: doshfunc (exec.c:4920)
==9598==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9598== 
==9598== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9601== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9601-by-pythonnut-on-???
==9601== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9601-by-pythonnut-on-???
==9601== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9601-by-pythonnut-on-???
==9601== 
==9601== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9601== don't want to do, unless you know exactly what you're doing,
==9601== or are doing some strange experiment):
==9601==   /usr/lib/valgrind/../../bin/vgdb --pid=9601 ...command...
==9601== 
==9601== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9601==   /path/to/gdb ./zsh
==9601== and then give GDB the following command
==9601==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9601
==9601== --pid is optional if only one valgrind process is running
==9601== 
--9601-- Caught __NR_exit; running __libc_freeres()
--9601-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9601== 
==9601== HEAP SUMMARY:
==9601==     in use at exit: 3,164,305 bytes in 69,925 blocks
==9601==   total heap usage: 1,462,141 allocs, 1,392,216 frees, 117,544,731 bytes allocated
==9601== 
==9601== Searching for pointers to 69,925 not-freed blocks
--9601--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9601--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9601--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9601--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9601--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9601--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9601--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9601--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9601--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9601--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9601--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9601--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9601--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9601--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9601--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9601--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9601--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9601--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9601--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9601--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9601--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9601--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9601--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9601--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9601--   Scanning root segment: 0x701a000..0x701afff (4096)
--9601--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9601--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9601--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9601--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9601--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9601--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9601--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9601--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9601--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9601== Checked 4,807,224 bytes
==9601== 
==9601== LEAK SUMMARY:
==9601==    definitely lost: 2,181 bytes in 11 blocks
==9601==    indirectly lost: 6,756 bytes in 7 blocks
==9601==      possibly lost: 0 bytes in 0 blocks
==9601==    still reachable: 3,155,368 bytes in 69,907 blocks
==9601==         suppressed: 0 bytes in 0 blocks
==9601== Rerun with --leak-check=full to see details of leaked memory
==9601== 
==9601== Use --track-origins=yes to see where uninitialised values come from
==9601== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9601== 
==9601== 1 errors in context 1 of 2:
==9601== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9601==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9601==    by 0x488CD0: stringsubst (subst.c:301)
==9601==    by 0x48801B: prefork (subst.c:77)
==9601==    by 0x42B318: execcmd (exec.c:2619)
==9601==    by 0x428CA0: execpline2 (exec.c:1697)
==9601==    by 0x427FD2: execpline (exec.c:1484)
==9601==    by 0x427756: execlist (exec.c:1267)
==9601==    by 0x42717C: execode (exec.c:1073)
==9601==    by 0x431299: runshfunc (exec.c:5040)
==9601==    by 0x430E76: doshfunc (exec.c:4920)
==9601==    by 0x4302FB: execshfunc (exec.c:4557)
==9601==    by 0x42D8C1: execcmd (exec.c:3373)
==9601== 
==9601== 
==9601== 2 errors in context 2 of 2:
==9601== Conditional jump or move depends on uninitialised value(s)
==9601==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9601==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9601==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9601==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9601==    by 0x42D8E9: execcmd (exec.c:3378)
==9601==    by 0x428CA0: execpline2 (exec.c:1697)
==9601==    by 0x427FD2: execpline (exec.c:1484)
==9601==    by 0x42779A: execlist (exec.c:1275)
==9601==    by 0x42717C: execode (exec.c:1073)
==9601==    by 0x431299: runshfunc (exec.c:5040)
==9601==    by 0x430E76: doshfunc (exec.c:4920)
==9601==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9601== 
==9601== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9602== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9602-by-pythonnut-on-???
==9602== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9602-by-pythonnut-on-???
==9602== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9602-by-pythonnut-on-???
==9602== 
==9602== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9602== don't want to do, unless you know exactly what you're doing,
==9602== or are doing some strange experiment):
==9602==   /usr/lib/valgrind/../../bin/vgdb --pid=9602 ...command...
==9602== 
==9602== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9602==   /path/to/gdb ./zsh
==9602== and then give GDB the following command
==9602==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9602
==9602== --pid is optional if only one valgrind process is running
==9602== 
--9602-- Caught __NR_exit; running __libc_freeres()
--9602-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9602== 
==9602== HEAP SUMMARY:
==9602==     in use at exit: 3,164,449 bytes in 69,925 blocks
==9602==   total heap usage: 1,462,148 allocs, 1,392,223 frees, 117,547,759 bytes allocated
==9602== 
==9602== Searching for pointers to 69,925 not-freed blocks
--9602--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9602--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9602--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9602--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9602--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9602--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9602--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9602--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9602--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9602--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9602--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9602--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9602--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9602--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9602--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9602--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9602--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9602--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9602--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9602--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9602--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9602--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9602--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9602--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9602--   Scanning root segment: 0x701a000..0x701afff (4096)
--9602--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9602--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9602--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9602--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9602--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9602--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9602--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9602--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9602--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9602== Checked 4,808,728 bytes
==9602== 
==9602== LEAK SUMMARY:
==9602==    definitely lost: 2,181 bytes in 11 blocks
==9602==    indirectly lost: 6,756 bytes in 7 blocks
==9602==      possibly lost: 0 bytes in 0 blocks
==9602==    still reachable: 3,155,512 bytes in 69,907 blocks
==9602==         suppressed: 0 bytes in 0 blocks
==9602== Rerun with --leak-check=full to see details of leaked memory
==9602== 
==9602== Use --track-origins=yes to see where uninitialised values come from
==9602== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9602== 
==9602== 1 errors in context 1 of 2:
==9602== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9602==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9602==    by 0x488CD0: stringsubst (subst.c:301)
==9602==    by 0x48801B: prefork (subst.c:77)
==9602==    by 0x42B318: execcmd (exec.c:2619)
==9602==    by 0x428CA0: execpline2 (exec.c:1697)
==9602==    by 0x427FD2: execpline (exec.c:1484)
==9602==    by 0x427756: execlist (exec.c:1267)
==9602==    by 0x42717C: execode (exec.c:1073)
==9602==    by 0x431299: runshfunc (exec.c:5040)
==9602==    by 0x430E76: doshfunc (exec.c:4920)
==9602==    by 0x4302FB: execshfunc (exec.c:4557)
==9602==    by 0x42D8C1: execcmd (exec.c:3373)
==9602== 
==9602== 
==9602== 2 errors in context 2 of 2:
==9602== Conditional jump or move depends on uninitialised value(s)
==9602==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9602==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9602==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9602==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9602==    by 0x42D8E9: execcmd (exec.c:3378)
==9602==    by 0x428CA0: execpline2 (exec.c:1697)
==9602==    by 0x427FD2: execpline (exec.c:1484)
==9602==    by 0x42779A: execlist (exec.c:1275)
==9602==    by 0x42717C: execode (exec.c:1073)
==9602==    by 0x431299: runshfunc (exec.c:5040)
==9602==    by 0x430E76: doshfunc (exec.c:4920)
==9602==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9602== 
==9602== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9603== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9603-by-pythonnut-on-???
==9603== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9603-by-pythonnut-on-???
==9603== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9603-by-pythonnut-on-???
==9603== 
==9603== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9603== don't want to do, unless you know exactly what you're doing,
==9603== or are doing some strange experiment):
==9603==   /usr/lib/valgrind/../../bin/vgdb --pid=9603 ...command...
==9603== 
==9603== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9603==   /path/to/gdb ./zsh
==9603== and then give GDB the following command
==9603==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9603
==9603== --pid is optional if only one valgrind process is running
==9603== 
--9603-- Caught __NR_exit; running __libc_freeres()
--9603-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9603== 
==9603== HEAP SUMMARY:
==9603==     in use at exit: 3,161,165 bytes in 69,837 blocks
==9603==   total heap usage: 1,462,376 allocs, 1,392,539 frees, 117,577,503 bytes allocated
==9603== 
==9603== Searching for pointers to 69,837 not-freed blocks
--9603--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9603--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9603--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9603--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9603--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9603--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9603--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9603--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9603--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9603--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9603--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9603--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9603--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9603--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9603--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9603--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9603--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9603--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9603--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9603--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9603--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9603--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9603--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9603--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9603--   Scanning root segment: 0x701a000..0x701afff (4096)
--9603--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9603--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9603--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9603--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9603--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9603--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9603--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9603--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9603--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9603== Checked 4,799,480 bytes
==9603== 
==9603== LEAK SUMMARY:
==9603==    definitely lost: 2,181 bytes in 11 blocks
==9603==    indirectly lost: 6,756 bytes in 7 blocks
==9603==      possibly lost: 0 bytes in 0 blocks
==9603==    still reachable: 3,152,228 bytes in 69,819 blocks
==9603==         suppressed: 0 bytes in 0 blocks
==9603== Rerun with --leak-check=full to see details of leaked memory
==9603== 
==9603== Use --track-origins=yes to see where uninitialised values come from
==9603== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9603== 
==9603== 1 errors in context 1 of 2:
==9603== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9603==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9603==    by 0x488CD0: stringsubst (subst.c:301)
==9603==    by 0x48801B: prefork (subst.c:77)
==9603==    by 0x42B318: execcmd (exec.c:2619)
==9603==    by 0x428CA0: execpline2 (exec.c:1697)
==9603==    by 0x427FD2: execpline (exec.c:1484)
==9603==    by 0x427756: execlist (exec.c:1267)
==9603==    by 0x42717C: execode (exec.c:1073)
==9603==    by 0x431299: runshfunc (exec.c:5040)
==9603==    by 0x430E76: doshfunc (exec.c:4920)
==9603==    by 0x4302FB: execshfunc (exec.c:4557)
==9603==    by 0x42D8C1: execcmd (exec.c:3373)
==9603== 
==9603== 
==9603== 2 errors in context 2 of 2:
==9603== Conditional jump or move depends on uninitialised value(s)
==9603==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9603==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9603==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9603==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9603==    by 0x42D8E9: execcmd (exec.c:3378)
==9603==    by 0x428CA0: execpline2 (exec.c:1697)
==9603==    by 0x427FD2: execpline (exec.c:1484)
==9603==    by 0x42779A: execlist (exec.c:1275)
==9603==    by 0x42717C: execode (exec.c:1073)
==9603==    by 0x431299: runshfunc (exec.c:5040)
==9603==    by 0x430E76: doshfunc (exec.c:4920)
==9603==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9603== 
==9603== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9604-- Caught __NR_exit; running __libc_freeres()
==9604== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9604-by-pythonnut-on-???
==9604== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9604-by-pythonnut-on-???
==9604== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9604-by-pythonnut-on-???
==9604== 
==9604== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9604== don't want to do, unless you know exactly what you're doing,
==9604== or are doing some strange experiment):
==9604==   /usr/lib/valgrind/../../bin/vgdb --pid=9604 ...command...
==9604== 
==9604== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9604==   /path/to/gdb ./zsh
==9604== and then give GDB the following command
==9604==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9604
==9604== --pid is optional if only one valgrind process is running
==9604== 
--9604-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9604== 
==9604== HEAP SUMMARY:
==9604==     in use at exit: 3,161,229 bytes in 69,837 blocks
==9604==   total heap usage: 1,462,382 allocs, 1,392,545 frees, 117,586,079 bytes allocated
==9604== 
==9604== Searching for pointers to 69,837 not-freed blocks
--9604--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9604--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9604--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9604--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9604--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9604--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9604--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9604--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9604--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9604--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9604--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9604--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9604--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9604--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9604--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9604--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9604--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9604--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9604--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9604--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9604--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9604--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9604--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9604--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9604--   Scanning root segment: 0x701a000..0x701afff (4096)
--9604--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9604--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9604--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9604--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9604--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9604--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9604--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9604--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9604--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9604== Checked 4,801,568 bytes
==9604== 
==9604== LEAK SUMMARY:
==9604==    definitely lost: 2,181 bytes in 11 blocks
==9604==    indirectly lost: 6,756 bytes in 7 blocks
==9604==      possibly lost: 0 bytes in 0 blocks
==9604==    still reachable: 3,152,292 bytes in 69,819 blocks
==9604==         suppressed: 0 bytes in 0 blocks
==9604== Rerun with --leak-check=full to see details of leaked memory
==9604== 
==9604== Use --track-origins=yes to see where uninitialised values come from
==9604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9604== 
==9604== 1 errors in context 1 of 2:
==9604== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9604==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9604==    by 0x488CD0: stringsubst (subst.c:301)
==9604==    by 0x48801B: prefork (subst.c:77)
==9604==    by 0x42B318: execcmd (exec.c:2619)
==9604==    by 0x428CA0: execpline2 (exec.c:1697)
==9604==    by 0x427FD2: execpline (exec.c:1484)
==9604==    by 0x427756: execlist (exec.c:1267)
==9604==    by 0x42717C: execode (exec.c:1073)
==9604==    by 0x431299: runshfunc (exec.c:5040)
==9604==    by 0x430E76: doshfunc (exec.c:4920)
==9604==    by 0x4302FB: execshfunc (exec.c:4557)
==9604==    by 0x42D8C1: execcmd (exec.c:3373)
==9604== 
==9604== 
==9604== 2 errors in context 2 of 2:
==9604== Conditional jump or move depends on uninitialised value(s)
==9604==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9604==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9604==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9604==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9604==    by 0x42D8E9: execcmd (exec.c:3378)
==9604==    by 0x428CA0: execpline2 (exec.c:1697)
==9604==    by 0x427FD2: execpline (exec.c:1484)
==9604==    by 0x42779A: execlist (exec.c:1275)
==9604==    by 0x42717C: execode (exec.c:1073)
==9604==    by 0x431299: runshfunc (exec.c:5040)
==9604==    by 0x430E76: doshfunc (exec.c:4920)
==9604==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9604== 
==9604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9605== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9605-by-pythonnut-on-???
==9605== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9605-by-pythonnut-on-???
==9605== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9605-by-pythonnut-on-???
==9605== 
==9605== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9605== don't want to do, unless you know exactly what you're doing,
==9605== or are doing some strange experiment):
==9605==   /usr/lib/valgrind/../../bin/vgdb --pid=9605 ...command...
==9605== 
==9605== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9605==   /path/to/gdb ./zsh
==9605== and then give GDB the following command
==9605==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9605
==9605== --pid is optional if only one valgrind process is running
==9605== 
==9606== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9606-by-pythonnut-on-???
==9606== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9606-by-pythonnut-on-???
==9606== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9606-by-pythonnut-on-???
==9606== 
==9606== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9606== don't want to do, unless you know exactly what you're doing,
==9606== or are doing some strange experiment):
==9606==   /usr/lib/valgrind/../../bin/vgdb --pid=9606 ...command...
==9606== 
==9606== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9606==   /path/to/gdb ./zsh
==9606== and then give GDB the following command
==9606==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9606
==9606== --pid is optional if only one valgrind process is running
==9606== 
==9607== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9607-by-pythonnut-on-???
==9607== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9607-by-pythonnut-on-???
==9607== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9607-by-pythonnut-on-???
==9607== 
==9607== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9607== don't want to do, unless you know exactly what you're doing,
==9607== or are doing some strange experiment):
==9607==   /usr/lib/valgrind/../../bin/vgdb --pid=9607 ...command...
==9607== 
==9607== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9607==   /path/to/gdb ./zsh
==9607== and then give GDB the following command
==9607==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9607
==9607== --pid is optional if only one valgrind process is running
==9607== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--9607-- Caught __NR_exit; running __libc_freeres()
--9607-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9607== 
==9607== HEAP SUMMARY:
==9607==     in use at exit: 3,165,048 bytes in 69,904 blocks
==9607==   total heap usage: 1,462,543 allocs, 1,392,639 frees, 117,615,403 bytes allocated
==9607== 
==9607== Searching for pointers to 69,904 not-freed blocks
--9607--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9607--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9607--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9607--   Scanning root segment: 0x4037000..0x403afff (16384)
--9607--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9607--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9607--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9607--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9607--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9607--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9607--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9607--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9607--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9607--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9607--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9607--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9607--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9607--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9607--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9607--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9607--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9607--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9607--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9607--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9607--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9607--   Scanning root segment: 0x701a000..0x701afff (4096)
--9607--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9607--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9607--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9607--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9607--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9607--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9607--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9607--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9607--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9607== Checked 4,823,920 bytes
==9607== 
==9607== LEAK SUMMARY:
==9607==    definitely lost: 2,181 bytes in 11 blocks
==9607==    indirectly lost: 6,756 bytes in 7 blocks
==9607==      possibly lost: 0 bytes in 0 blocks
==9607==    still reachable: 3,156,111 bytes in 69,886 blocks
==9607==         suppressed: 0 bytes in 0 blocks
==9607== Rerun with --leak-check=full to see details of leaked memory
==9607== 
==9607== Use --track-origins=yes to see where uninitialised values come from
==9607== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9607== 
==9607== 1 errors in context 1 of 2:
==9607== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9607==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9607==    by 0x488CD0: stringsubst (subst.c:301)
==9607==    by 0x48801B: prefork (subst.c:77)
==9607==    by 0x42B318: execcmd (exec.c:2619)
==9607==    by 0x428CA0: execpline2 (exec.c:1697)
==9607==    by 0x427FD2: execpline (exec.c:1484)
==9607==    by 0x427756: execlist (exec.c:1267)
==9607==    by 0x42717C: execode (exec.c:1073)
==9607==    by 0x431299: runshfunc (exec.c:5040)
==9607==    by 0x430E76: doshfunc (exec.c:4920)
==9607==    by 0x4302FB: execshfunc (exec.c:4557)
==9607==    by 0x42D8C1: execcmd (exec.c:3373)
==9607== 
==9607== 
==9607== 2 errors in context 2 of 2:
==9607== Conditional jump or move depends on uninitialised value(s)
==9607==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9607==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9607==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9607==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9607==    by 0x42D8E9: execcmd (exec.c:3378)
==9607==    by 0x428CA0: execpline2 (exec.c:1697)
==9607==    by 0x427FD2: execpline (exec.c:1484)
==9607==    by 0x42779A: execlist (exec.c:1275)
==9607==    by 0x42717C: execode (exec.c:1073)
==9607==    by 0x431299: runshfunc (exec.c:5040)
==9607==    by 0x430E76: doshfunc (exec.c:4920)
==9607==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9607== 
==9607== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9610== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9610-by-pythonnut-on-???
==9610== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9610-by-pythonnut-on-???
==9610== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9610-by-pythonnut-on-???
==9610== 
==9610== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9610== don't want to do, unless you know exactly what you're doing,
==9610== or are doing some strange experiment):
==9610==   /usr/lib/valgrind/../../bin/vgdb --pid=9610 ...command...
==9610== 
==9610== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9610==   /path/to/gdb ./zsh
==9610== and then give GDB the following command
==9610==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9610
==9610== --pid is optional if only one valgrind process is running
==9610== 
--9610-- Caught __NR_exit; running __libc_freeres()
==9611== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9611-by-pythonnut-on-???
==9611== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9611-by-pythonnut-on-???
==9611== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9611-by-pythonnut-on-???
==9611== 
==9611== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9611== don't want to do, unless you know exactly what you're doing,
==9611== or are doing some strange experiment):
==9611==   /usr/lib/valgrind/../../bin/vgdb --pid=9611 ...command...
==9611== 
==9611== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9611==   /path/to/gdb ./zsh
==9611== and then give GDB the following command
==9611==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9611
==9611== --pid is optional if only one valgrind process is running
==9611== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9610-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9610== 
==9610== HEAP SUMMARY:
==9610==     in use at exit: 3,201,915 bytes in 69,911 blocks
==9610==   total heap usage: 1,462,550 allocs, 1,392,639 frees, 117,655,326 bytes allocated
==9610== 
==9610== Searching for pointers to 69,911 not-freed blocks
--9610--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9610--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9610--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9610--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9610--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9610--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9610--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9610--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9610--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9610--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9610--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9610--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9610--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9610--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9610--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9610--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9610--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9610--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9610--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9610--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9610--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9610--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9610--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9610--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9610--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9610--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9610--   Scanning root segment: 0x701a000..0x701afff (4096)
--9610--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9610--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9610--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9610--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9610--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9610--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9610--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9610--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9610--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9610== Checked 4,935,720 bytes
==9610== 
==9610== LEAK SUMMARY:
==9610==    definitely lost: 2,181 bytes in 11 blocks
==9610==    indirectly lost: 6,756 bytes in 7 blocks
==9610==      possibly lost: 0 bytes in 0 blocks
==9610==    still reachable: 3,192,978 bytes in 69,893 blocks
==9610==         suppressed: 0 bytes in 0 blocks
==9610== Rerun with --leak-check=full to see details of leaked memory
==9610== 
==9610== Use --track-origins=yes to see where uninitialised values come from
==9610== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9610== 
==9610== 1 errors in context 1 of 2:
==9610== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9610==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9610==    by 0x488CD0: stringsubst (subst.c:301)
==9610==    by 0x48801B: prefork (subst.c:77)
==9610==    by 0x42B318: execcmd (exec.c:2619)
==9610==    by 0x428CA0: execpline2 (exec.c:1697)
==9610==    by 0x427FD2: execpline (exec.c:1484)
==9610==    by 0x427756: execlist (exec.c:1267)
==9610==    by 0x42717C: execode (exec.c:1073)
==9610==    by 0x431299: runshfunc (exec.c:5040)
==9610==    by 0x430E76: doshfunc (exec.c:4920)
==9610==    by 0x4302FB: execshfunc (exec.c:4557)
==9610==    by 0x42D8C1: execcmd (exec.c:3373)
==9610== 
==9610== 
==9610== 2 errors in context 2 of 2:
==9610== Conditional jump or move depends on uninitialised value(s)
==9610==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9610==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9610==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9610==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9610==    by 0x42D8E9: execcmd (exec.c:3378)
==9610==    by 0x428CA0: execpline2 (exec.c:1697)
==9610==    by 0x427FD2: execpline (exec.c:1484)
==9610==    by 0x42779A: execlist (exec.c:1275)
==9610==    by 0x42717C: execode (exec.c:1073)
==9610==    by 0x431299: runshfunc (exec.c:5040)
==9610==    by 0x430E76: doshfunc (exec.c:4920)
==9610==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9610== 
==9610== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9609== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9609-by-pythonnut-on-???
==9609== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9609-by-pythonnut-on-???
==9609== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9609-by-pythonnut-on-???
==9609== 
==9609== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9609== don't want to do, unless you know exactly what you're doing,
==9609== or are doing some strange experiment):
==9609==   /usr/lib/valgrind/../../bin/vgdb --pid=9609 ...command...
==9609== 
==9609== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9609==   /path/to/gdb ./zsh
==9609== and then give GDB the following command
==9609==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9609
==9609== --pid is optional if only one valgrind process is running
==9609== 
--9609-- Caught __NR_exit; running __libc_freeres()
--9609-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9609== 
==9609== HEAP SUMMARY:
==9609==     in use at exit: 3,201,851 bytes in 69,908 blocks
==9609==   total heap usage: 1,462,552 allocs, 1,392,644 frees, 117,655,870 bytes allocated
==9609== 
==9609== Searching for pointers to 69,908 not-freed blocks
--9609--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9609--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9609--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9609--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9609--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9609--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9609--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9609--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9609--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9609--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9609--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9609--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9609--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9609--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9609--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9609--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9609--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9609--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9609--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9609--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9609--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9609--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9609--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9609--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9609--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9609--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9609--   Scanning root segment: 0x701a000..0x701afff (4096)
--9609--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9609--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9609--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9609--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9609--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9609--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9609--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9609--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9609--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9609== Checked 4,935,032 bytes
==9609== 
==9609== LEAK SUMMARY:
==9609==    definitely lost: 2,181 bytes in 11 blocks
==9609==    indirectly lost: 6,756 bytes in 7 blocks
==9609==      possibly lost: 0 bytes in 0 blocks
==9609==    still reachable: 3,192,914 bytes in 69,890 blocks
==9609==         suppressed: 0 bytes in 0 blocks
==9609== Rerun with --leak-check=full to see details of leaked memory
==9609== 
==9609== Use --track-origins=yes to see where uninitialised values come from
==9609== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9609== 
==9609== 1 errors in context 1 of 2:
==9609== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9609==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9609==    by 0x488CD0: stringsubst (subst.c:301)
==9609==    by 0x48801B: prefork (subst.c:77)
==9609==    by 0x42B318: execcmd (exec.c:2619)
==9609==    by 0x428CA0: execpline2 (exec.c:1697)
==9609==    by 0x427FD2: execpline (exec.c:1484)
==9609==    by 0x427756: execlist (exec.c:1267)
==9609==    by 0x42717C: execode (exec.c:1073)
==9609==    by 0x431299: runshfunc (exec.c:5040)
==9609==    by 0x430E76: doshfunc (exec.c:4920)
==9609==    by 0x4302FB: execshfunc (exec.c:4557)
==9609==    by 0x42D8C1: execcmd (exec.c:3373)
==9609== 
==9609== 
==9609== 2 errors in context 2 of 2:
==9609== Conditional jump or move depends on uninitialised value(s)
==9609==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9609==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9609==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9609==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9609==    by 0x42D8E9: execcmd (exec.c:3378)
==9609==    by 0x428CA0: execpline2 (exec.c:1697)
==9609==    by 0x427FD2: execpline (exec.c:1484)
==9609==    by 0x42779A: execlist (exec.c:1275)
==9609==    by 0x42717C: execode (exec.c:1073)
==9609==    by 0x431299: runshfunc (exec.c:5040)
==9609==    by 0x430E76: doshfunc (exec.c:4920)
==9609==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9609== 
==9609== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9614== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9614-by-pythonnut-on-???
==9614== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9614-by-pythonnut-on-???
==9614== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9614-by-pythonnut-on-???
==9614== 
==9614== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9614== don't want to do, unless you know exactly what you're doing,
==9614== or are doing some strange experiment):
==9614==   /usr/lib/valgrind/../../bin/vgdb --pid=9614 ...command...
==9614== 
==9614== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9614==   /path/to/gdb ./zsh
==9614== and then give GDB the following command
==9614==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9614
==9614== --pid is optional if only one valgrind process is running
==9614== 
==9615== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9615-by-pythonnut-on-???
==9615== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9615-by-pythonnut-on-???
==9615== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9615-by-pythonnut-on-???
==9615== 
==9615== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9615== don't want to do, unless you know exactly what you're doing,
==9615== or are doing some strange experiment):
==9615==   /usr/lib/valgrind/../../bin/vgdb --pid=9615 ...command...
==9615== 
==9615== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9615==   /path/to/gdb ./zsh
==9615== and then give GDB the following command
==9615==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9615
==9615== --pid is optional if only one valgrind process is running
==9615== 
--9615-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9615-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9615== 
==9615== HEAP SUMMARY:
==9615==     in use at exit: 3,238,537 bytes in 69,914 blocks
==9615==   total heap usage: 1,462,559 allocs, 1,392,645 frees, 117,694,169 bytes allocated
==9615== 
==9615== Searching for pointers to 69,914 not-freed blocks
--9615--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9615--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9615--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9615--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9615--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9615--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9615--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9615--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9615--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9615--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9615--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9615--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9615--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9615--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9615--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9615--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9615--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9615--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9615--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9615--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9615--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9615--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9615--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9615--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9615--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9615--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9615--   Scanning root segment: 0x701a000..0x701afff (4096)
--9615--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9615--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9615--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9615--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9615--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9615--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9615--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9615--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9615--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9615== Checked 5,009,184 bytes
==9615== 
==9615== LEAK SUMMARY:
==9615==    definitely lost: 2,181 bytes in 11 blocks
==9615==    indirectly lost: 6,756 bytes in 7 blocks
==9615==      possibly lost: 0 bytes in 0 blocks
==9615==    still reachable: 3,229,600 bytes in 69,896 blocks
==9615==         suppressed: 0 bytes in 0 blocks
==9615== Rerun with --leak-check=full to see details of leaked memory
==9615== 
==9615== Use --track-origins=yes to see where uninitialised values come from
==9615== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9615== 
==9615== 1 errors in context 1 of 2:
==9615== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9615==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9615==    by 0x488CD0: stringsubst (subst.c:301)
==9615==    by 0x48801B: prefork (subst.c:77)
==9615==    by 0x42B318: execcmd (exec.c:2619)
==9615==    by 0x428CA0: execpline2 (exec.c:1697)
==9615==    by 0x427FD2: execpline (exec.c:1484)
==9615==    by 0x427756: execlist (exec.c:1267)
==9615==    by 0x42717C: execode (exec.c:1073)
==9615==    by 0x431299: runshfunc (exec.c:5040)
==9615==    by 0x430E76: doshfunc (exec.c:4920)
==9615==    by 0x4302FB: execshfunc (exec.c:4557)
==9615==    by 0x42D8C1: execcmd (exec.c:3373)
==9615== 
==9615== 
==9615== 2 errors in context 2 of 2:
==9615== Conditional jump or move depends on uninitialised value(s)
==9615==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9615==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9615==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9615==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9615==    by 0x42D8E9: execcmd (exec.c:3378)
==9615==    by 0x428CA0: execpline2 (exec.c:1697)
==9615==    by 0x427FD2: execpline (exec.c:1484)
==9615==    by 0x42779A: execlist (exec.c:1275)
==9615==    by 0x42717C: execode (exec.c:1073)
==9615==    by 0x431299: runshfunc (exec.c:5040)
==9615==    by 0x430E76: doshfunc (exec.c:4920)
==9615==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9615== 
==9615== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9614-- Caught __NR_exit; running __libc_freeres()
--9614-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9614== 
==9614== HEAP SUMMARY:
==9614==     in use at exit: 3,201,897 bytes in 69,911 blocks
==9614==   total heap usage: 1,462,562 allocs, 1,392,651 frees, 117,694,745 bytes allocated
==9614== 
==9614== Searching for pointers to 69,911 not-freed blocks
--9614--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9614--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9614--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9614--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9614--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9614--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9614--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9614--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9614--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9614--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9614--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9614--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9614--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9614--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9614--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9614--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9614--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9614--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9614--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9614--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9614--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9614--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9614--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9614--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9614--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9614--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9614--   Scanning root segment: 0x701a000..0x701afff (4096)
--9614--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9614--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9614--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9614--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9614--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9614--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9614--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9614--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9614--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9614== Checked 4,971,928 bytes
==9614== 
==9614== LEAK SUMMARY:
==9614==    definitely lost: 2,181 bytes in 11 blocks
==9614==    indirectly lost: 6,756 bytes in 7 blocks
==9614==      possibly lost: 0 bytes in 0 blocks
==9614==    still reachable: 3,192,960 bytes in 69,893 blocks
==9614==         suppressed: 0 bytes in 0 blocks
==9614== Rerun with --leak-check=full to see details of leaked memory
==9614== 
==9614== Use --track-origins=yes to see where uninitialised values come from
==9614== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9614== 
==9614== 1 errors in context 1 of 2:
==9614== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9614==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9614==    by 0x488CD0: stringsubst (subst.c:301)
==9614==    by 0x48801B: prefork (subst.c:77)
==9614==    by 0x42B318: execcmd (exec.c:2619)
==9614==    by 0x428CA0: execpline2 (exec.c:1697)
==9614==    by 0x427FD2: execpline (exec.c:1484)
==9614==    by 0x427756: execlist (exec.c:1267)
==9614==    by 0x42717C: execode (exec.c:1073)
==9614==    by 0x431299: runshfunc (exec.c:5040)
==9614==    by 0x430E76: doshfunc (exec.c:4920)
==9614==    by 0x4302FB: execshfunc (exec.c:4557)
==9614==    by 0x42D8C1: execcmd (exec.c:3373)
==9614== 
==9614== 
==9614== 2 errors in context 2 of 2:
==9614== Conditional jump or move depends on uninitialised value(s)
==9614==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9614==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9614==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9614==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9614==    by 0x42D8E9: execcmd (exec.c:3378)
==9614==    by 0x428CA0: execpline2 (exec.c:1697)
==9614==    by 0x427FD2: execpline (exec.c:1484)
==9614==    by 0x42779A: execlist (exec.c:1275)
==9614==    by 0x42717C: execode (exec.c:1073)
==9614==    by 0x431299: runshfunc (exec.c:5040)
==9614==    by 0x430E76: doshfunc (exec.c:4920)
==9614==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9614== 
==9614== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9617== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9617-by-pythonnut-on-???
==9617== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9617-by-pythonnut-on-???
==9617== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9617-by-pythonnut-on-???
==9617== 
==9617== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9617== don't want to do, unless you know exactly what you're doing,
==9617== or are doing some strange experiment):
==9617==   /usr/lib/valgrind/../../bin/vgdb --pid=9617 ...command...
==9617== 
==9617== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9617==   /path/to/gdb ./zsh
==9617== and then give GDB the following command
==9617==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9617
==9617== --pid is optional if only one valgrind process is running
==9617== 
==9618== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9618-by-pythonnut-on-???
==9618== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9618-by-pythonnut-on-???
==9618== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9618-by-pythonnut-on-???
==9618== 
==9618== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9618== don't want to do, unless you know exactly what you're doing,
==9618== or are doing some strange experiment):
==9618==   /usr/lib/valgrind/../../bin/vgdb --pid=9618 ...command...
==9618== 
==9618== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9618==   /path/to/gdb ./zsh
==9618== and then give GDB the following command
==9618==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9618
==9618== --pid is optional if only one valgrind process is running
==9618== 
--9618-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA64C,  len 4
--9618-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9618== 
==9618== HEAP SUMMARY:
==9618==     in use at exit: 3,238,623 bytes in 69,917 blocks
==9618==   total heap usage: 1,462,572 allocs, 1,392,655 frees, 117,699,455 bytes allocated
==9618== 
==9618== Searching for pointers to 69,917 not-freed blocks
--9618--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9618--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9618--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9618--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9618--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9618--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9618--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9618--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9618--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9618--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9618--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9618--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9618--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9618--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9618--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9618--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9618--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9618--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9618--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9618--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9618--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9618--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9618--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9618--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9618--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9618--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9618--   Scanning root segment: 0x701a000..0x701afff (4096)
--9618--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9618--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9618--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9618--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9618--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9618--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9618--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9618--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9618--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9618== Checked 5,009,536 bytes
==9618== 
==9618== LEAK SUMMARY:
==9618==    definitely lost: 2,181 bytes in 11 blocks
==9618==    indirectly lost: 6,756 bytes in 7 blocks
==9618==      possibly lost: 0 bytes in 0 blocks
==9618==    still reachable: 3,229,686 bytes in 69,899 blocks
==9618==         suppressed: 0 bytes in 0 blocks
==9618== Rerun with --leak-check=full to see details of leaked memory
==9618== 
==9618== Use --track-origins=yes to see where uninitialised values come from
==9618== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9618== 
==9618== 1 errors in context 1 of 2:
==9618== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9618==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9618==    by 0x488CD0: stringsubst (subst.c:301)
==9618==    by 0x48801B: prefork (subst.c:77)
==9618==    by 0x42B318: execcmd (exec.c:2619)
==9618==    by 0x428CA0: execpline2 (exec.c:1697)
==9618==    by 0x427FD2: execpline (exec.c:1484)
==9618==    by 0x427756: execlist (exec.c:1267)
==9618==    by 0x42717C: execode (exec.c:1073)
==9618==    by 0x431299: runshfunc (exec.c:5040)
==9618==    by 0x430E76: doshfunc (exec.c:4920)
==9618==    by 0x4302FB: execshfunc (exec.c:4557)
==9618==    by 0x42D8C1: execcmd (exec.c:3373)
==9618== 
==9618== 
==9618== 2 errors in context 2 of 2:
==9618== Conditional jump or move depends on uninitialised value(s)
==9618==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9618==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9618==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9618==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9618==    by 0x42D8E9: execcmd (exec.c:3378)
==9618==    by 0x428CA0: execpline2 (exec.c:1697)
==9618==    by 0x427FD2: execpline (exec.c:1484)
==9618==    by 0x42779A: execlist (exec.c:1275)
==9618==    by 0x42717C: execode (exec.c:1073)
==9618==    by 0x431299: runshfunc (exec.c:5040)
==9618==    by 0x430E76: doshfunc (exec.c:4920)
==9618==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9618== 
==9618== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9617-- Caught __NR_exit; running __libc_freeres()
--9617-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9617== 
==9617== HEAP SUMMARY:
==9617==     in use at exit: 3,201,983 bytes in 69,914 blocks
==9617==   total heap usage: 1,462,575 allocs, 1,392,661 frees, 117,700,031 bytes allocated
==9617== 
==9617== Searching for pointers to 69,914 not-freed blocks
--9617--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9617--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9617--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9617--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9617--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9617--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9617--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9617--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9617--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9617--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9617--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9617--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9617--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9617--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9617--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9617--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9617--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9617--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9617--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9617--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9617--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9617--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9617--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9617--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9617--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9617--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9617--   Scanning root segment: 0x701a000..0x701afff (4096)
--9617--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9617--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9617--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9617--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9617--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9617--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9617--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9617--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9617--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9617== Checked 4,972,280 bytes
==9617== 
==9617== LEAK SUMMARY:
==9617==    definitely lost: 2,181 bytes in 11 blocks
==9617==    indirectly lost: 6,756 bytes in 7 blocks
==9617==      possibly lost: 0 bytes in 0 blocks
==9617==    still reachable: 3,193,046 bytes in 69,896 blocks
==9617==         suppressed: 0 bytes in 0 blocks
==9617== Rerun with --leak-check=full to see details of leaked memory
==9617== 
==9617== Use --track-origins=yes to see where uninitialised values come from
==9617== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9617== 
==9617== 1 errors in context 1 of 2:
==9617== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9617==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9617==    by 0x488CD0: stringsubst (subst.c:301)
==9617==    by 0x48801B: prefork (subst.c:77)
==9617==    by 0x42B318: execcmd (exec.c:2619)
==9617==    by 0x428CA0: execpline2 (exec.c:1697)
==9617==    by 0x427FD2: execpline (exec.c:1484)
==9617==    by 0x427756: execlist (exec.c:1267)
==9617==    by 0x42717C: execode (exec.c:1073)
==9617==    by 0x431299: runshfunc (exec.c:5040)
==9617==    by 0x430E76: doshfunc (exec.c:4920)
==9617==    by 0x4302FB: execshfunc (exec.c:4557)
==9617==    by 0x42D8C1: execcmd (exec.c:3373)
==9617== 
==9617== 
==9617== 2 errors in context 2 of 2:
==9617== Conditional jump or move depends on uninitialised value(s)
==9617==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9617==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9617==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9617==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9617==    by 0x42D8E9: execcmd (exec.c:3378)
==9617==    by 0x428CA0: execpline2 (exec.c:1697)
==9617==    by 0x427FD2: execpline (exec.c:1484)
==9617==    by 0x42779A: execlist (exec.c:1275)
==9617==    by 0x42717C: execode (exec.c:1073)
==9617==    by 0x431299: runshfunc (exec.c:5040)
==9617==    by 0x430E76: doshfunc (exec.c:4920)
==9617==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9617== 
==9617== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9620== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9620-by-pythonnut-on-???
==9620== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9620-by-pythonnut-on-???
==9620== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9620-by-pythonnut-on-???
==9620== 
==9620== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9620== don't want to do, unless you know exactly what you're doing,
==9620== or are doing some strange experiment):
==9620==   /usr/lib/valgrind/../../bin/vgdb --pid=9620 ...command...
==9620== 
==9620== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9620==   /path/to/gdb ./zsh
==9620== and then give GDB the following command
==9620==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9620
==9620== --pid is optional if only one valgrind process is running
==9620== 
--9621-- Caught __NR_exit; running __libc_freeres()
==9621== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9621-by-pythonnut-on-???
==9621== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9621-by-pythonnut-on-???
==9621== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9621-by-pythonnut-on-???
==9621== 
==9621== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9621== don't want to do, unless you know exactly what you're doing,
==9621== or are doing some strange experiment):
==9621==   /usr/lib/valgrind/../../bin/vgdb --pid=9621 ...command...
==9621== 
==9621== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9621==   /path/to/gdb ./zsh
==9621== and then give GDB the following command
==9621==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9621
==9621== --pid is optional if only one valgrind process is running
==9621== 
client request: code 4d430005,  addr 0xFFEFE9B1C,  len 4
--9621-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9621== 
==9621== HEAP SUMMARY:
==9621==     in use at exit: 3,202,111 bytes in 69,917 blocks
==9621==   total heap usage: 1,462,585 allocs, 1,392,668 frees, 117,669,592 bytes allocated
==9621== 
==9621== Searching for pointers to 69,917 not-freed blocks
--9621--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9621--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9621--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9621--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9621--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9621--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9621--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9621--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9621--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9621--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9621--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9621--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9621--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9621--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9621--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9621--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9621--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9621--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9621--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9621--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9621--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9621--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9621--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9621--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9621--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9621--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9621--   Scanning root segment: 0x701a000..0x701afff (4096)
--9621--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9621--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9621--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9621--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9621--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9621--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9621--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9621--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9621--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9621== Checked 4,936,992 bytes
==9621== 
==9621== LEAK SUMMARY:
==9621==    definitely lost: 2,181 bytes in 11 blocks
==9621==    indirectly lost: 6,756 bytes in 7 blocks
==9621==      possibly lost: 0 bytes in 0 blocks
==9621==    still reachable: 3,193,174 bytes in 69,899 blocks
==9621==         suppressed: 0 bytes in 0 blocks
==9621== Rerun with --leak-check=full to see details of leaked memory
==9621== 
==9621== Use --track-origins=yes to see where uninitialised values come from
==9621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9621== 
==9621== 1 errors in context 1 of 2:
==9621== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9621==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9621==    by 0x488CD0: stringsubst (subst.c:301)
==9621==    by 0x48801B: prefork (subst.c:77)
==9621==    by 0x42B318: execcmd (exec.c:2619)
==9621==    by 0x428CA0: execpline2 (exec.c:1697)
==9621==    by 0x427FD2: execpline (exec.c:1484)
==9621==    by 0x427756: execlist (exec.c:1267)
==9621==    by 0x42717C: execode (exec.c:1073)
==9621==    by 0x431299: runshfunc (exec.c:5040)
==9621==    by 0x430E76: doshfunc (exec.c:4920)
==9621==    by 0x4302FB: execshfunc (exec.c:4557)
==9621==    by 0x42D8C1: execcmd (exec.c:3373)
==9621== 
==9621== 
==9621== 2 errors in context 2 of 2:
==9621== Conditional jump or move depends on uninitialised value(s)
==9621==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9621==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9621==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9621==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9621==    by 0x42D8E9: execcmd (exec.c:3378)
==9621==    by 0x428CA0: execpline2 (exec.c:1697)
==9621==    by 0x427FD2: execpline (exec.c:1484)
==9621==    by 0x42779A: execlist (exec.c:1275)
==9621==    by 0x42717C: execode (exec.c:1073)
==9621==    by 0x431299: runshfunc (exec.c:5040)
==9621==    by 0x430E76: doshfunc (exec.c:4920)
==9621==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9621== 
==9621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9620-- Caught __NR_exit; running __libc_freeres()
--9620-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9620== 
==9620== HEAP SUMMARY:
==9620==     in use at exit: 3,202,079 bytes in 69,914 blocks
==9620==   total heap usage: 1,462,588 allocs, 1,392,674 frees, 117,670,264 bytes allocated
==9620== 
==9620== Searching for pointers to 69,914 not-freed blocks
--9620--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9620--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9620--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9620--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9620--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9620--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9620--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9620--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9620--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9620--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9620--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9620--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9620--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9620--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9620--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9620--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9620--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9620--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9620--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9620--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9620--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9620--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9620--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9620--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9620--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9620--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9620--   Scanning root segment: 0x701a000..0x701afff (4096)
--9620--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9620--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9620--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9620--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9620--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9620--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9620--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9620--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9620--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9620== Checked 4,936,312 bytes
==9620== 
==9620== LEAK SUMMARY:
==9620==    definitely lost: 2,181 bytes in 11 blocks
==9620==    indirectly lost: 6,756 bytes in 7 blocks
==9620==      possibly lost: 0 bytes in 0 blocks
==9620==    still reachable: 3,193,142 bytes in 69,896 blocks
==9620==         suppressed: 0 bytes in 0 blocks
==9620== Rerun with --leak-check=full to see details of leaked memory
==9620== 
==9620== Use --track-origins=yes to see where uninitialised values come from
==9620== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9620== 
==9620== 1 errors in context 1 of 2:
==9620== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9620==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9620==    by 0x488CD0: stringsubst (subst.c:301)
==9620==    by 0x48801B: prefork (subst.c:77)
==9620==    by 0x42B318: execcmd (exec.c:2619)
==9620==    by 0x428CA0: execpline2 (exec.c:1697)
==9620==    by 0x427FD2: execpline (exec.c:1484)
==9620==    by 0x427756: execlist (exec.c:1267)
==9620==    by 0x42717C: execode (exec.c:1073)
==9620==    by 0x431299: runshfunc (exec.c:5040)
==9620==    by 0x430E76: doshfunc (exec.c:4920)
==9620==    by 0x4302FB: execshfunc (exec.c:4557)
==9620==    by 0x42D8C1: execcmd (exec.c:3373)
==9620== 
==9620== 
==9620== 2 errors in context 2 of 2:
==9620== Conditional jump or move depends on uninitialised value(s)
==9620==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9620==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9620==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9620==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9620==    by 0x42D8E9: execcmd (exec.c:3378)
==9620==    by 0x428CA0: execpline2 (exec.c:1697)
==9620==    by 0x427FD2: execpline (exec.c:1484)
==9620==    by 0x42779A: execlist (exec.c:1275)
==9620==    by 0x42717C: execode (exec.c:1073)
==9620==    by 0x431299: runshfunc (exec.c:5040)
==9620==    by 0x430E76: doshfunc (exec.c:4920)
==9620==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9620== 
==9620== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9625== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9625-by-pythonnut-on-???
==9625== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9625-by-pythonnut-on-???
==9625== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9625-by-pythonnut-on-???
==9625== 
==9625== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9625== don't want to do, unless you know exactly what you're doing,
==9625== or are doing some strange experiment):
==9625==   /usr/lib/valgrind/../../bin/vgdb --pid=9625 ...command...
==9625== 
==9625== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9625==   /path/to/gdb ./zsh
==9625== and then give GDB the following command
==9625==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9625
==9625== --pid is optional if only one valgrind process is running
==9625== 
==9626== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9626-by-pythonnut-on-???
==9626== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9626-by-pythonnut-on-???
==9626== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9626-by-pythonnut-on-???
==9626== 
==9626== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9626== don't want to do, unless you know exactly what you're doing,
==9626== or are doing some strange experiment):
==9626==   /usr/lib/valgrind/../../bin/vgdb --pid=9626 ...command...
==9626== 
==9626== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9626==   /path/to/gdb ./zsh
==9626== and then give GDB the following command
==9626==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9626
==9626== --pid is optional if only one valgrind process is running
==9626== 
--9626-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE9FCC,  len 4
--9626-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9626== 
==9626== HEAP SUMMARY:
==9626==     in use at exit: 3,238,823 bytes in 69,920 blocks
==9626==   total heap usage: 1,462,595 allocs, 1,392,675 frees, 117,708,737 bytes allocated
==9626== 
==9626== Searching for pointers to 69,920 not-freed blocks
--9626--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9626--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9626--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9626--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9626--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9626--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9626--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9626--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9626--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9626--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9626--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9626--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9626--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9626--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9626--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9626--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9626--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9626--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9626--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9626--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9626--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9626--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9626--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9626--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9626--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9626--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9626--   Scanning root segment: 0x701a000..0x701afff (4096)
--9626--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9626--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9626--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9626--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9626--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9626--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9626--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9626--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9626--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9626== Checked 5,010,272 bytes
==9626== 
==9626== LEAK SUMMARY:
==9626==    definitely lost: 2,181 bytes in 11 blocks
==9626==    indirectly lost: 6,756 bytes in 7 blocks
==9626==      possibly lost: 0 bytes in 0 blocks
==9626==    still reachable: 3,229,886 bytes in 69,902 blocks
==9626==         suppressed: 0 bytes in 0 blocks
==9626== Rerun with --leak-check=full to see details of leaked memory
==9626== 
==9626== Use --track-origins=yes to see where uninitialised values come from
==9626== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9626== 
==9626== 1 errors in context 1 of 2:
==9626== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9626==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9626==    by 0x488CD0: stringsubst (subst.c:301)
==9626==    by 0x48801B: prefork (subst.c:77)
==9626==    by 0x42B318: execcmd (exec.c:2619)
==9626==    by 0x428CA0: execpline2 (exec.c:1697)
==9626==    by 0x427FD2: execpline (exec.c:1484)
==9626==    by 0x427756: execlist (exec.c:1267)
==9626==    by 0x42717C: execode (exec.c:1073)
==9626==    by 0x431299: runshfunc (exec.c:5040)
==9626==    by 0x430E76: doshfunc (exec.c:4920)
==9626==    by 0x4302FB: execshfunc (exec.c:4557)
==9626==    by 0x42D8C1: execcmd (exec.c:3373)
==9626== 
==9626== 
==9626== 2 errors in context 2 of 2:
==9626== Conditional jump or move depends on uninitialised value(s)
==9626==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9626==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9626==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9626==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9626==    by 0x42D8E9: execcmd (exec.c:3378)
==9626==    by 0x428CA0: execpline2 (exec.c:1697)
==9626==    by 0x427FD2: execpline (exec.c:1484)
==9626==    by 0x42779A: execlist (exec.c:1275)
==9626==    by 0x42717C: execode (exec.c:1073)
==9626==    by 0x431299: runshfunc (exec.c:5040)
==9626==    by 0x430E76: doshfunc (exec.c:4920)
==9626==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9626== 
==9626== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9625-- Caught __NR_exit; running __libc_freeres()
--9625-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9625== 
==9625== HEAP SUMMARY:
==9625==     in use at exit: 3,202,279 bytes in 69,917 blocks
==9625==   total heap usage: 1,462,598 allocs, 1,392,681 frees, 117,709,409 bytes allocated
==9625== 
==9625== Searching for pointers to 69,917 not-freed blocks
--9625--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9625--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9625--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9625--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9625--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9625--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9625--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9625--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9625--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9625--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9625--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9625--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9625--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9625--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9625--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9625--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9625--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9625--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9625--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9625--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9625--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9625--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9625--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9625--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9625--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9625--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9625--   Scanning root segment: 0x701a000..0x701afff (4096)
--9625--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9625--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9625--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9625--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9625--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9625--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9625--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9625--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9625--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9625== Checked 4,973,096 bytes
==9625== 
==9625== LEAK SUMMARY:
==9625==    definitely lost: 2,181 bytes in 11 blocks
==9625==    indirectly lost: 6,756 bytes in 7 blocks
==9625==      possibly lost: 0 bytes in 0 blocks
==9625==    still reachable: 3,193,342 bytes in 69,899 blocks
==9625==         suppressed: 0 bytes in 0 blocks
==9625== Rerun with --leak-check=full to see details of leaked memory
==9625== 
==9625== Use --track-origins=yes to see where uninitialised values come from
==9625== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9625== 
==9625== 1 errors in context 1 of 2:
==9625== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9625==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9625==    by 0x488CD0: stringsubst (subst.c:301)
==9625==    by 0x48801B: prefork (subst.c:77)
==9625==    by 0x42B318: execcmd (exec.c:2619)
==9625==    by 0x428CA0: execpline2 (exec.c:1697)
==9625==    by 0x427FD2: execpline (exec.c:1484)
==9625==    by 0x427756: execlist (exec.c:1267)
==9625==    by 0x42717C: execode (exec.c:1073)
==9625==    by 0x431299: runshfunc (exec.c:5040)
==9625==    by 0x430E76: doshfunc (exec.c:4920)
==9625==    by 0x4302FB: execshfunc (exec.c:4557)
==9625==    by 0x42D8C1: execcmd (exec.c:3373)
==9625== 
==9625== 
==9625== 2 errors in context 2 of 2:
==9625== Conditional jump or move depends on uninitialised value(s)
==9625==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9625==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9625==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9625==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9625==    by 0x42D8E9: execcmd (exec.c:3378)
==9625==    by 0x428CA0: execpline2 (exec.c:1697)
==9625==    by 0x427FD2: execpline (exec.c:1484)
==9625==    by 0x42779A: execlist (exec.c:1275)
==9625==    by 0x42717C: execode (exec.c:1073)
==9625==    by 0x431299: runshfunc (exec.c:5040)
==9625==    by 0x430E76: doshfunc (exec.c:4920)
==9625==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9625== 
==9625== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9606-- Caught __NR_exit; running __libc_freeres()
--9606-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9606== 
==9606== HEAP SUMMARY:
==9606==     in use at exit: 3,164,585 bytes in 69,894 blocks
==9606==   total heap usage: 1,462,604 allocs, 1,392,710 frees, 117,677,299 bytes allocated
==9606== 
==9606== Searching for pointers to 69,894 not-freed blocks
--9606--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9606--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9606--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9606--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9606--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9606--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9606--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9606--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9606--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9606--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9606--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9606--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9606--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9606--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9606--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9606--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9606--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9606--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9606--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9606--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9606--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9606--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9606--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9606--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9606--   Scanning root segment: 0x701a000..0x701afff (4096)
--9606--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9606--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9606--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9606--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9606--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9606--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9606--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9606--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9606--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9606== Checked 4,805,000 bytes
==9606== 
==9606== LEAK SUMMARY:
==9606==    definitely lost: 2,181 bytes in 11 blocks
==9606==    indirectly lost: 6,756 bytes in 7 blocks
==9606==      possibly lost: 0 bytes in 0 blocks
==9606==    still reachable: 3,155,648 bytes in 69,876 blocks
==9606==         suppressed: 0 bytes in 0 blocks
==9606== Rerun with --leak-check=full to see details of leaked memory
==9606== 
==9606== Use --track-origins=yes to see where uninitialised values come from
==9606== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9606== 
==9606== 1 errors in context 1 of 2:
==9606== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9606==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9606==    by 0x488CD0: stringsubst (subst.c:301)
==9606==    by 0x48801B: prefork (subst.c:77)
==9606==    by 0x42B318: execcmd (exec.c:2619)
==9606==    by 0x428CA0: execpline2 (exec.c:1697)
==9606==    by 0x427FD2: execpline (exec.c:1484)
==9606==    by 0x427756: execlist (exec.c:1267)
==9606==    by 0x42717C: execode (exec.c:1073)
==9606==    by 0x431299: runshfunc (exec.c:5040)
==9606==    by 0x430E76: doshfunc (exec.c:4920)
==9606==    by 0x4302FB: execshfunc (exec.c:4557)
==9606==    by 0x42D8C1: execcmd (exec.c:3373)
==9606== 
==9606== 
==9606== 2 errors in context 2 of 2:
==9606== Conditional jump or move depends on uninitialised value(s)
==9606==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9606==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9606==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9606==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9606==    by 0x42D8E9: execcmd (exec.c:3378)
==9606==    by 0x428CA0: execpline2 (exec.c:1697)
==9606==    by 0x427FD2: execpline (exec.c:1484)
==9606==    by 0x42779A: execlist (exec.c:1275)
==9606==    by 0x42717C: execode (exec.c:1073)
==9606==    by 0x431299: runshfunc (exec.c:5040)
==9606==    by 0x430E76: doshfunc (exec.c:4920)
==9606==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9606== 
==9606== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9605-- Caught __NR_exit; running __libc_freeres()
--9605-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9605== 
==9605== HEAP SUMMARY:
==9605==     in use at exit: 3,163,233 bytes in 69,856 blocks
==9605==   total heap usage: 1,462,503 allocs, 1,392,647 frees, 117,605,421 bytes allocated
==9605== 
==9605== Searching for pointers to 69,856 not-freed blocks
--9605--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9605--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9605--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9605--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9605--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9605--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9605--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9605--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9605--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9605--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9605--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9605--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9605--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9605--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9605--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9605--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9605--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9605--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9605--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9605--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9605--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9605--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9605--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9605--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9605--   Scanning root segment: 0x701a000..0x701afff (4096)
--9605--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9605--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9605--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9605--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9605--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9605--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9605--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9605--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9605--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9605== Checked 4,801,920 bytes
==9605== 
==9605== LEAK SUMMARY:
==9605==    definitely lost: 2,181 bytes in 11 blocks
==9605==    indirectly lost: 6,756 bytes in 7 blocks
==9605==      possibly lost: 0 bytes in 0 blocks
==9605==    still reachable: 3,154,296 bytes in 69,838 blocks
==9605==         suppressed: 0 bytes in 0 blocks
==9605== Rerun with --leak-check=full to see details of leaked memory
==9605== 
==9605== Use --track-origins=yes to see where uninitialised values come from
==9605== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9605== 
==9605== 1 errors in context 1 of 2:
==9605== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9605==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9605==    by 0x488CD0: stringsubst (subst.c:301)
==9605==    by 0x48801B: prefork (subst.c:77)
==9605==    by 0x42B318: execcmd (exec.c:2619)
==9605==    by 0x428CA0: execpline2 (exec.c:1697)
==9605==    by 0x427FD2: execpline (exec.c:1484)
==9605==    by 0x427756: execlist (exec.c:1267)
==9605==    by 0x42717C: execode (exec.c:1073)
==9605==    by 0x431299: runshfunc (exec.c:5040)
==9605==    by 0x430E76: doshfunc (exec.c:4920)
==9605==    by 0x4302FB: execshfunc (exec.c:4557)
==9605==    by 0x42D8C1: execcmd (exec.c:3373)
==9605== 
==9605== 
==9605== 2 errors in context 2 of 2:
==9605== Conditional jump or move depends on uninitialised value(s)
==9605==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9605==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9605==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9605==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9605==    by 0x42D8E9: execcmd (exec.c:3378)
==9605==    by 0x428CA0: execpline2 (exec.c:1697)
==9605==    by 0x427FD2: execpline (exec.c:1484)
==9605==    by 0x42779A: execlist (exec.c:1275)
==9605==    by 0x42717C: execode (exec.c:1073)
==9605==    by 0x431299: runshfunc (exec.c:5040)
==9605==    by 0x430E76: doshfunc (exec.c:4920)
==9605==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9605== 
==9605== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9628== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9628-by-pythonnut-on-???
==9628== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9628-by-pythonnut-on-???
==9628== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9628-by-pythonnut-on-???
==9628== 
==9628== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9628== don't want to do, unless you know exactly what you're doing,
==9628== or are doing some strange experiment):
==9628==   /usr/lib/valgrind/../../bin/vgdb --pid=9628 ...command...
==9628== 
==9628== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9628==   /path/to/gdb ./zsh
==9628== and then give GDB the following command
==9628==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9628
==9628== --pid is optional if only one valgrind process is running
==9628== 
--9628-- Caught __NR_exit; running __libc_freeres()
--9628-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9628== 
==9628== HEAP SUMMARY:
==9628==     in use at exit: 3,169,072 bytes in 70,032 blocks
==9628==   total heap usage: 1,462,969 allocs, 1,392,937 frees, 117,625,315 bytes allocated
==9628== 
==9628== Searching for pointers to 70,032 not-freed blocks
--9628--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9628--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9628--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9628--   Scanning root segment: 0x4037000..0x403afff (16384)
--9628--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9628--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9628--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9628--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9628--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9628--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9628--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9628--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9628--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9628--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9628--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9628--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9628--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9628--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9628--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9628--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9628--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9628--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9628--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9628--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9628--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9628--   Scanning root segment: 0x701a000..0x701afff (4096)
--9628--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9628--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9628--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9628--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9628--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9628--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9628--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9628--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9628--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9628== Checked 4,830,272 bytes
==9628== 
==9628== LEAK SUMMARY:
==9628==    definitely lost: 2,181 bytes in 11 blocks
==9628==    indirectly lost: 6,756 bytes in 7 blocks
==9628==      possibly lost: 0 bytes in 0 blocks
==9628==    still reachable: 3,160,135 bytes in 70,014 blocks
==9628==         suppressed: 0 bytes in 0 blocks
==9628== Rerun with --leak-check=full to see details of leaked memory
==9628== 
==9628== Use --track-origins=yes to see where uninitialised values come from
==9628== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9628== 
==9628== 1 errors in context 1 of 2:
==9628== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9628==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9628==    by 0x488CD0: stringsubst (subst.c:301)
==9628==    by 0x48801B: prefork (subst.c:77)
==9628==    by 0x42B318: execcmd (exec.c:2619)
==9628==    by 0x428CA0: execpline2 (exec.c:1697)
==9628==    by 0x427FD2: execpline (exec.c:1484)
==9628==    by 0x427756: execlist (exec.c:1267)
==9628==    by 0x42717C: execode (exec.c:1073)
==9628==    by 0x431299: runshfunc (exec.c:5040)
==9628==    by 0x430E76: doshfunc (exec.c:4920)
==9628==    by 0x4302FB: execshfunc (exec.c:4557)
==9628==    by 0x42D8C1: execcmd (exec.c:3373)
==9628== 
==9628== 
==9628== 2 errors in context 2 of 2:
==9628== Conditional jump or move depends on uninitialised value(s)
==9628==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9628==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9628==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9628==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9628==    by 0x42D8E9: execcmd (exec.c:3378)
==9628==    by 0x428CA0: execpline2 (exec.c:1697)
==9628==    by 0x427FD2: execpline (exec.c:1484)
==9628==    by 0x42779A: execlist (exec.c:1275)
==9628==    by 0x42717C: execode (exec.c:1073)
==9628==    by 0x431299: runshfunc (exec.c:5040)
==9628==    by 0x430E76: doshfunc (exec.c:4920)
==9628==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9628== 
==9628== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9631== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9631-by-pythonnut-on-???
==9631== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9631-by-pythonnut-on-???
==9631== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9631-by-pythonnut-on-???
==9631== 
==9631== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9631== don't want to do, unless you know exactly what you're doing,
==9631== or are doing some strange experiment):
==9631==   /usr/lib/valgrind/../../bin/vgdb --pid=9631 ...command...
==9631== 
==9631== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9631==   /path/to/gdb ./zsh
==9631== and then give GDB the following command
==9631==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9631
==9631== --pid is optional if only one valgrind process is running
==9631== 
--9631-- Caught __NR_exit; running __libc_freeres()
--9631-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9631== 
==9631== HEAP SUMMARY:
==9631==     in use at exit: 3,169,215 bytes in 70,032 blocks
==9631==   total heap usage: 1,462,977 allocs, 1,392,945 frees, 117,628,367 bytes allocated
==9631== 
==9631== Searching for pointers to 70,032 not-freed blocks
--9631--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9631--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9631--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9631--   Scanning root segment: 0x4037000..0x403afff (16384)
--9631--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9631--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9631--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9631--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9631--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9631--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9631--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9631--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9631--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9631--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9631--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9631--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9631--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9631--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9631--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9631--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9631--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9631--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9631--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9631--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9631--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9631--   Scanning root segment: 0x701a000..0x701afff (4096)
--9631--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9631--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9631--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9631--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9631--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9631--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9631--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9631--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9631--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9631== Checked 4,831,768 bytes
==9631== 
==9631== LEAK SUMMARY:
==9631==    definitely lost: 2,181 bytes in 11 blocks
==9631==    indirectly lost: 6,756 bytes in 7 blocks
==9631==      possibly lost: 0 bytes in 0 blocks
==9631==    still reachable: 3,160,278 bytes in 70,014 blocks
==9631==         suppressed: 0 bytes in 0 blocks
==9631== Rerun with --leak-check=full to see details of leaked memory
==9631== 
==9631== Use --track-origins=yes to see where uninitialised values come from
==9631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9631== 
==9631== 1 errors in context 1 of 2:
==9631== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9631==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9631==    by 0x488CD0: stringsubst (subst.c:301)
==9631==    by 0x48801B: prefork (subst.c:77)
==9631==    by 0x42B318: execcmd (exec.c:2619)
==9631==    by 0x428CA0: execpline2 (exec.c:1697)
==9631==    by 0x427FD2: execpline (exec.c:1484)
==9631==    by 0x427756: execlist (exec.c:1267)
==9631==    by 0x42717C: execode (exec.c:1073)
==9631==    by 0x431299: runshfunc (exec.c:5040)
==9631==    by 0x430E76: doshfunc (exec.c:4920)
==9631==    by 0x4302FB: execshfunc (exec.c:4557)
==9631==    by 0x42D8C1: execcmd (exec.c:3373)
==9631== 
==9631== 
==9631== 2 errors in context 2 of 2:
==9631== Conditional jump or move depends on uninitialised value(s)
==9631==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9631==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9631==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9631==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9631==    by 0x42D8E9: execcmd (exec.c:3378)
==9631==    by 0x428CA0: execpline2 (exec.c:1697)
==9631==    by 0x427FD2: execpline (exec.c:1484)
==9631==    by 0x42779A: execlist (exec.c:1275)
==9631==    by 0x42717C: execode (exec.c:1073)
==9631==    by 0x431299: runshfunc (exec.c:5040)
==9631==    by 0x430E76: doshfunc (exec.c:4920)
==9631==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9631== 
==9631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9632== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9632-by-pythonnut-on-???
==9632== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9632-by-pythonnut-on-???
==9632== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9632-by-pythonnut-on-???
==9632== 
==9632== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9632== don't want to do, unless you know exactly what you're doing,
==9632== or are doing some strange experiment):
==9632==   /usr/lib/valgrind/../../bin/vgdb --pid=9632 ...command...
==9632== 
==9632== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9632==   /path/to/gdb ./zsh
==9632== and then give GDB the following command
==9632==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9632
==9632== --pid is optional if only one valgrind process is running
==9632== 
--9633-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==9633== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9633-by-pythonnut-on-???
==9633== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9633-by-pythonnut-on-???
==9633== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9633-by-pythonnut-on-???
==9633== 
==9633== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9633== don't want to do, unless you know exactly what you're doing,
==9633== or are doing some strange experiment):
==9633==   /usr/lib/valgrind/../../bin/vgdb --pid=9633 ...command...
==9633== 
==9633== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9633==   /path/to/gdb ./zsh
==9633== and then give GDB the following command
==9633==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9633
==9633== --pid is optional if only one valgrind process is running
==9633== 
--9633-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9633== 
==9633== HEAP SUMMARY:
==9633==     in use at exit: 3,119,586 bytes in 68,912 blocks
==9633==   total heap usage: 1,463,288 allocs, 1,394,376 frees, 117,667,848 bytes allocated
==9633== 
==9633== Searching for pointers to 68,912 not-freed blocks
--9633--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9633--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9633--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9633--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9633--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9633--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9633--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9633--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9633--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9633--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9633--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9633--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9633--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9633--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9633--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9633--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9633--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9633--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9633--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9633--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9633--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9633--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9633--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9633--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9633--   Scanning root segment: 0x701a000..0x701afff (4096)
--9633--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9633--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9633--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9633--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9633--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9633--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9633--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9633--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9633--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9633== Checked 4,762,840 bytes
==9633== 
==9633== LEAK SUMMARY:
==9633==    definitely lost: 2,181 bytes in 11 blocks
==9633==    indirectly lost: 6,756 bytes in 7 blocks
==9633==      possibly lost: 0 bytes in 0 blocks
==9633==    still reachable: 3,110,649 bytes in 68,894 blocks
==9633==         suppressed: 0 bytes in 0 blocks
==9633== Rerun with --leak-check=full to see details of leaked memory
==9633== 
==9633== Use --track-origins=yes to see where uninitialised values come from
==9633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9633== 
==9633== 1 errors in context 1 of 2:
==9633== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9633==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9633==    by 0x488CD0: stringsubst (subst.c:301)
==9633==    by 0x48801B: prefork (subst.c:77)
==9633==    by 0x42B318: execcmd (exec.c:2619)
==9633==    by 0x428CA0: execpline2 (exec.c:1697)
==9633==    by 0x427FD2: execpline (exec.c:1484)
==9633==    by 0x427756: execlist (exec.c:1267)
==9633==    by 0x42717C: execode (exec.c:1073)
==9633==    by 0x431299: runshfunc (exec.c:5040)
==9633==    by 0x430E76: doshfunc (exec.c:4920)
==9633==    by 0x4302FB: execshfunc (exec.c:4557)
==9633==    by 0x42D8C1: execcmd (exec.c:3373)
==9633== 
==9633== 
==9633== 2 errors in context 2 of 2:
==9633== Conditional jump or move depends on uninitialised value(s)
==9633==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9633==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9633==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9633==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9633==    by 0x42D8E9: execcmd (exec.c:3378)
==9633==    by 0x428CA0: execpline2 (exec.c:1697)
==9633==    by 0x427FD2: execpline (exec.c:1484)
==9633==    by 0x42779A: execlist (exec.c:1275)
==9633==    by 0x42717C: execode (exec.c:1073)
==9633==    by 0x431299: runshfunc (exec.c:5040)
==9633==    by 0x430E76: doshfunc (exec.c:4920)
==9633==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9633== 
==9633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9632-- Caught __NR_exit; running __libc_freeres()
--9632-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9632== 
==9632== HEAP SUMMARY:
==9632==     in use at exit: 3,119,187 bytes in 68,902 blocks
==9632==   total heap usage: 1,463,290 allocs, 1,394,388 frees, 117,668,392 bytes allocated
==9632== 
==9632== Searching for pointers to 68,902 not-freed blocks
--9632--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9632--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9632--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9632--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9632--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9632--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9632--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9632--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9632--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9632--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9632--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9632--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9632--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9632--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9632--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9632--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9632--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9632--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9632--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9632--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9632--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9632--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9632--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9632--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9632--   Scanning root segment: 0x701a000..0x701afff (4096)
--9632--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9632--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9632--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9632--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9632--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9632--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9632--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9632--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9632--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9632== Checked 4,760,464 bytes
==9632== 
==9632== LEAK SUMMARY:
==9632==    definitely lost: 2,181 bytes in 11 blocks
==9632==    indirectly lost: 6,756 bytes in 7 blocks
==9632==      possibly lost: 0 bytes in 0 blocks
==9632==    still reachable: 3,110,250 bytes in 68,884 blocks
==9632==         suppressed: 0 bytes in 0 blocks
==9632== Rerun with --leak-check=full to see details of leaked memory
==9632== 
==9632== Use --track-origins=yes to see where uninitialised values come from
==9632== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9632== 
==9632== 1 errors in context 1 of 2:
==9632== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9632==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9632==    by 0x488CD0: stringsubst (subst.c:301)
==9632==    by 0x48801B: prefork (subst.c:77)
==9632==    by 0x42B318: execcmd (exec.c:2619)
==9632==    by 0x428CA0: execpline2 (exec.c:1697)
==9632==    by 0x427FD2: execpline (exec.c:1484)
==9632==    by 0x427756: execlist (exec.c:1267)
==9632==    by 0x42717C: execode (exec.c:1073)
==9632==    by 0x431299: runshfunc (exec.c:5040)
==9632==    by 0x430E76: doshfunc (exec.c:4920)
==9632==    by 0x4302FB: execshfunc (exec.c:4557)
==9632==    by 0x42D8C1: execcmd (exec.c:3373)
==9632== 
==9632== 
==9632== 2 errors in context 2 of 2:
==9632== Conditional jump or move depends on uninitialised value(s)
==9632==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9632==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9632==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9632==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9632==    by 0x42D8E9: execcmd (exec.c:3378)
==9632==    by 0x428CA0: execpline2 (exec.c:1697)
==9632==    by 0x427FD2: execpline (exec.c:1484)
==9632==    by 0x42779A: execlist (exec.c:1275)
==9632==    by 0x42717C: execode (exec.c:1073)
==9632==    by 0x431299: runshfunc (exec.c:5040)
==9632==    by 0x430E76: doshfunc (exec.c:4920)
==9632==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9632== 
==9632== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9636-- Caught __NR_exit; running __libc_freeres()
==9636== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9636-by-pythonnut-on-???
==9636== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9636-by-pythonnut-on-???
==9636== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9636-by-pythonnut-on-???
==9636== 
==9636== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9636== don't want to do, unless you know exactly what you're doing,
==9636== or are doing some strange experiment):
==9636==   /usr/lib/valgrind/../../bin/vgdb --pid=9636 ...command...
==9636== 
==9636== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9636==   /path/to/gdb ./zsh
==9636== and then give GDB the following command
==9636==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9636
==9636== --pid is optional if only one valgrind process is running
==9636== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
--9636-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9636== 
==9636== HEAP SUMMARY:
==9636==     in use at exit: 3,119,675 bytes in 68,914 blocks
==9636==   total heap usage: 1,463,330 allocs, 1,394,416 frees, 117,684,108 bytes allocated
==9636== 
==9636== Searching for pointers to 68,914 not-freed blocks
--9636--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9636--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9636--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9636--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9636--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9636--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9636--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9636--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9636--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9636--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9636--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9636--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9636--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9636--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9636--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9636--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9636--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9636--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9636--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9636--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9636--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9636--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9636--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9636--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9636--   Scanning root segment: 0x701a000..0x701afff (4096)
--9636--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9636--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9636--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9636--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9636--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9636--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9636--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9636--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9636--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9636== Checked 4,763,616 bytes
==9636== 
==9636== LEAK SUMMARY:
==9636==    definitely lost: 2,181 bytes in 11 blocks
==9636==    indirectly lost: 6,756 bytes in 7 blocks
==9636==      possibly lost: 0 bytes in 0 blocks
==9636==    still reachable: 3,110,738 bytes in 68,896 blocks
==9636==         suppressed: 0 bytes in 0 blocks
==9636== Rerun with --leak-check=full to see details of leaked memory
==9636== 
==9636== Use --track-origins=yes to see where uninitialised values come from
==9636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9636== 
==9636== 1 errors in context 1 of 2:
==9636== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9636==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9636==    by 0x488CD0: stringsubst (subst.c:301)
==9636==    by 0x48801B: prefork (subst.c:77)
==9636==    by 0x42B318: execcmd (exec.c:2619)
==9636==    by 0x428CA0: execpline2 (exec.c:1697)
==9636==    by 0x427FD2: execpline (exec.c:1484)
==9636==    by 0x427756: execlist (exec.c:1267)
==9636==    by 0x42717C: execode (exec.c:1073)
==9636==    by 0x431299: runshfunc (exec.c:5040)
==9636==    by 0x430E76: doshfunc (exec.c:4920)
==9636==    by 0x4302FB: execshfunc (exec.c:4557)
==9636==    by 0x42D8C1: execcmd (exec.c:3373)
==9636== 
==9636== 
==9636== 2 errors in context 2 of 2:
==9636== Conditional jump or move depends on uninitialised value(s)
==9636==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9636==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9636==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9636==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9636==    by 0x42D8E9: execcmd (exec.c:3378)
==9636==    by 0x428CA0: execpline2 (exec.c:1697)
==9636==    by 0x427FD2: execpline (exec.c:1484)
==9636==    by 0x42779A: execlist (exec.c:1275)
==9636==    by 0x42717C: execode (exec.c:1073)
==9636==    by 0x431299: runshfunc (exec.c:5040)
==9636==    by 0x430E76: doshfunc (exec.c:4920)
==9636==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9636== 
==9636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9635-- Caught __NR_exit; running __libc_freeres()
==9635== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9635-by-pythonnut-on-???
==9635== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9635-by-pythonnut-on-???
==9635== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9635-by-pythonnut-on-???
==9635== 
==9635== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9635== don't want to do, unless you know exactly what you're doing,
==9635== or are doing some strange experiment):
==9635==   /usr/lib/valgrind/../../bin/vgdb --pid=9635 ...command...
==9635== 
==9635== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9635==   /path/to/gdb ./zsh
==9635== and then give GDB the following command
==9635==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9635
==9635== --pid is optional if only one valgrind process is running
==9635== 
--9635-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9635== 
==9635== HEAP SUMMARY:
==9635==     in use at exit: 3,119,624 bytes in 68,915 blocks
==9635==   total heap usage: 1,463,327 allocs, 1,394,412 frees, 117,680,580 bytes allocated
==9635== 
==9635== Searching for pointers to 68,915 not-freed blocks
--9635--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9635--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9635--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9635--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9635--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9635--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9635--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9635--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9635--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9635--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9635--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9635--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9635--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9635--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9635--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9635--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9635--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9635--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9635--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9635--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9635--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9635--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9635--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9635--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9635--   Scanning root segment: 0x701a000..0x701afff (4096)
--9635--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9635--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9635--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9635--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9635--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9635--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9635--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9635--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9635--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9635== Checked 4,763,224 bytes
==9635== 
==9635== LEAK SUMMARY:
==9635==    definitely lost: 2,181 bytes in 11 blocks
==9635==    indirectly lost: 6,756 bytes in 7 blocks
==9635==      possibly lost: 0 bytes in 0 blocks
==9635==    still reachable: 3,110,687 bytes in 68,897 blocks
==9635==         suppressed: 0 bytes in 0 blocks
==9635== Rerun with --leak-check=full to see details of leaked memory
==9635== 
==9635== Use --track-origins=yes to see where uninitialised values come from
==9635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9635== 
==9635== 1 errors in context 1 of 2:
==9635== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9635==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9635==    by 0x488CD0: stringsubst (subst.c:301)
==9635==    by 0x48801B: prefork (subst.c:77)
==9635==    by 0x42B318: execcmd (exec.c:2619)
==9635==    by 0x428CA0: execpline2 (exec.c:1697)
==9635==    by 0x427FD2: execpline (exec.c:1484)
==9635==    by 0x427756: execlist (exec.c:1267)
==9635==    by 0x42717C: execode (exec.c:1073)
==9635==    by 0x431299: runshfunc (exec.c:5040)
==9635==    by 0x430E76: doshfunc (exec.c:4920)
==9635==    by 0x4302FB: execshfunc (exec.c:4557)
==9635==    by 0x42D8C1: execcmd (exec.c:3373)
==9635== 
==9635== 
==9635== 2 errors in context 2 of 2:
==9635== Conditional jump or move depends on uninitialised value(s)
==9635==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9635==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9635==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9635==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9635==    by 0x42D8E9: execcmd (exec.c:3378)
==9635==    by 0x428CA0: execpline2 (exec.c:1697)
==9635==    by 0x427FD2: execpline (exec.c:1484)
==9635==    by 0x42779A: execlist (exec.c:1275)
==9635==    by 0x42717C: execode (exec.c:1073)
==9635==    by 0x431299: runshfunc (exec.c:5040)
==9635==    by 0x430E76: doshfunc (exec.c:4920)
==9635==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9635== 
==9635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--9639-- Caught __NR_exit; running __libc_freeres()
==9639== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9639-by-pythonnut-on-???
==9639== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9639-by-pythonnut-on-???
==9639== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9639-by-pythonnut-on-???
==9639== 
==9639== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9639== don't want to do, unless you know exactly what you're doing,
==9639== or are doing some strange experiment):
==9639==   /usr/lib/valgrind/../../bin/vgdb --pid=9639 ...command...
==9639== 
==9639== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9639==   /path/to/gdb ./zsh
==9639== and then give GDB the following command
==9639==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9639
==9639== --pid is optional if only one valgrind process is running
==9639== 
--9639-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9639== 
==9639== HEAP SUMMARY:
==9639==     in use at exit: 3,119,925 bytes in 68,920 blocks
==9639==   total heap usage: 1,463,338 allocs, 1,394,418 frees, 117,685,674 bytes allocated
==9639== 
==9639== Searching for pointers to 68,920 not-freed blocks
--9639--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9639--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9639--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9639--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9639--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9639--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9639--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9639--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9639--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9639--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9639--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9639--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9639--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9639--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9639--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9639--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9639--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9639--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9639--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9639--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9639--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9639--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9639--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9639--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9639--   Scanning root segment: 0x701a000..0x701afff (4096)
--9639--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9639--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9639--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9639--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9639--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9639--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9639--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9639--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9639--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9639== Checked 4,763,272 bytes
==9639== 
==9639== LEAK SUMMARY:
==9639==    definitely lost: 2,181 bytes in 11 blocks
==9639==    indirectly lost: 6,756 bytes in 7 blocks
==9639==      possibly lost: 0 bytes in 0 blocks
==9639==    still reachable: 3,110,988 bytes in 68,902 blocks
==9639==         suppressed: 0 bytes in 0 blocks
==9639== Rerun with --leak-check=full to see details of leaked memory
==9639== 
==9639== Use --track-origins=yes to see where uninitialised values come from
==9639== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9639== 
==9639== 1 errors in context 1 of 2:
==9639== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9639==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9639==    by 0x488CD0: stringsubst (subst.c:301)
==9639==    by 0x48801B: prefork (subst.c:77)
==9639==    by 0x42B318: execcmd (exec.c:2619)
==9639==    by 0x428CA0: execpline2 (exec.c:1697)
==9639==    by 0x427FD2: execpline (exec.c:1484)
==9639==    by 0x427756: execlist (exec.c:1267)
==9639==    by 0x42717C: execode (exec.c:1073)
==9639==    by 0x431299: runshfunc (exec.c:5040)
==9639==    by 0x430E76: doshfunc (exec.c:4920)
==9639==    by 0x4302FB: execshfunc (exec.c:4557)
==9639==    by 0x42D8C1: execcmd (exec.c:3373)
==9639== 
==9639== 
==9639== 2 errors in context 2 of 2:
==9639== Conditional jump or move depends on uninitialised value(s)
==9639==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9639==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9639==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9639==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9639==    by 0x42D8E9: execcmd (exec.c:3378)
==9639==    by 0x428CA0: execpline2 (exec.c:1697)
==9639==    by 0x427FD2: execpline (exec.c:1484)
==9639==    by 0x42779A: execlist (exec.c:1275)
==9639==    by 0x42717C: execode (exec.c:1073)
==9639==    by 0x431299: runshfunc (exec.c:5040)
==9639==    by 0x430E76: doshfunc (exec.c:4920)
==9639==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9639== 
==9639== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9643-- Caught __NR_exit; running __libc_freeres()
==9643== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9643-by-pythonnut-on-???
==9643== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9643-by-pythonnut-on-???
==9643== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9643-by-pythonnut-on-???
==9643== 
==9643== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9643== don't want to do, unless you know exactly what you're doing,
==9643== or are doing some strange experiment):
==9643==   /usr/lib/valgrind/../../bin/vgdb --pid=9643 ...command...
==9643== 
==9643== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9643==   /path/to/gdb ./zsh
==9643== and then give GDB the following command
==9643==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9643
==9643== --pid is optional if only one valgrind process is running
==9643== 
--9643-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9643== 
==9643== HEAP SUMMARY:
==9643==     in use at exit: 3,120,032 bytes in 68,924 blocks
==9643==   total heap usage: 1,463,346 allocs, 1,394,422 frees, 117,687,893 bytes allocated
==9643== 
==9643== Searching for pointers to 68,924 not-freed blocks
--9643--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9643--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9643--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9643--   Scanning root segment: 0x4037000..0x403afff (16384)
--9643--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9643--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9643--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9643--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9643--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9643--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9643--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9643--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9643--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9643--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9643--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9643--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9643--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9643--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9643--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9643--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9643--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9643--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9643--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9643--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9643--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9643--   Scanning root segment: 0x701a000..0x701afff (4096)
--9643--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9643--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9643--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9643--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9643--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9643--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9643--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9643--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9643--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9643== Checked 4,780,024 bytes
==9643== 
==9643== LEAK SUMMARY:
==9643==    definitely lost: 2,181 bytes in 11 blocks
==9643==    indirectly lost: 6,756 bytes in 7 blocks
==9643==      possibly lost: 0 bytes in 0 blocks
==9643==    still reachable: 3,111,095 bytes in 68,906 blocks
==9643==         suppressed: 0 bytes in 0 blocks
==9643== Rerun with --leak-check=full to see details of leaked memory
==9643== 
==9643== Use --track-origins=yes to see where uninitialised values come from
==9643== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9643== 
==9643== 1 errors in context 1 of 2:
==9643== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9643==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9643==    by 0x488CD0: stringsubst (subst.c:301)
==9643==    by 0x48801B: prefork (subst.c:77)
==9643==    by 0x42B318: execcmd (exec.c:2619)
==9643==    by 0x428CA0: execpline2 (exec.c:1697)
==9643==    by 0x427FD2: execpline (exec.c:1484)
==9643==    by 0x427756: execlist (exec.c:1267)
==9643==    by 0x42717C: execode (exec.c:1073)
==9643==    by 0x431299: runshfunc (exec.c:5040)
==9643==    by 0x430E76: doshfunc (exec.c:4920)
==9643==    by 0x4302FB: execshfunc (exec.c:4557)
==9643==    by 0x42D8C1: execcmd (exec.c:3373)
==9643== 
==9643== 
==9643== 2 errors in context 2 of 2:
==9643== Conditional jump or move depends on uninitialised value(s)
==9643==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9643==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9643==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9643==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9643==    by 0x42D8E9: execcmd (exec.c:3378)
==9643==    by 0x428CA0: execpline2 (exec.c:1697)
==9643==    by 0x427FD2: execpline (exec.c:1484)
==9643==    by 0x42779A: execlist (exec.c:1275)
==9643==    by 0x42717C: execode (exec.c:1073)
==9643==    by 0x431299: runshfunc (exec.c:5040)
==9643==    by 0x430E76: doshfunc (exec.c:4920)
==9643==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9643== 
==9643== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--9647-- Caught __NR_exit; running __libc_freeres()
==9647== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9647-by-pythonnut-on-???
==9647== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9647-by-pythonnut-on-???
==9647== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9647-by-pythonnut-on-???
==9647== 
==9647== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9647== don't want to do, unless you know exactly what you're doing,
==9647== or are doing some strange experiment):
==9647==   /usr/lib/valgrind/../../bin/vgdb --pid=9647 ...command...
==9647== 
==9647== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9647==   /path/to/gdb ./zsh
==9647== and then give GDB the following command
==9647==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9647
==9647== --pid is optional if only one valgrind process is running
==9647== 
--9647-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9647== 
==9647== HEAP SUMMARY:
==9647==     in use at exit: 3,119,292 bytes in 68,907 blocks
==9647==   total heap usage: 1,463,396 allocs, 1,394,489 frees, 117,694,788 bytes allocated
==9647== 
==9647== Searching for pointers to 68,907 not-freed blocks
--9647--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9647--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9647--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9647--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9647--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9647--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9647--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9647--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9647--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9647--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9647--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9647--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9647--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9647--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9647--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9647--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9647--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9647--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9647--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9647--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9647--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9647--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9647--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9647--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9647--   Scanning root segment: 0x701a000..0x701afff (4096)
--9647--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9647--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9647--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9647--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9647--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9647--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9647--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9647--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9647--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9647== Checked 4,780,160 bytes
==9647== 
==9647== LEAK SUMMARY:
==9647==    definitely lost: 2,181 bytes in 11 blocks
==9647==    indirectly lost: 6,756 bytes in 7 blocks
==9647==      possibly lost: 0 bytes in 0 blocks
==9647==    still reachable: 3,110,355 bytes in 68,889 blocks
==9647==         suppressed: 0 bytes in 0 blocks
==9647== Rerun with --leak-check=full to see details of leaked memory
==9647== 
==9647== Use --track-origins=yes to see where uninitialised values come from
==9647== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9647== 
==9647== 1 errors in context 1 of 2:
==9647== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9647==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9647==    by 0x488CD0: stringsubst (subst.c:301)
==9647==    by 0x48801B: prefork (subst.c:77)
==9647==    by 0x42B318: execcmd (exec.c:2619)
==9647==    by 0x428CA0: execpline2 (exec.c:1697)
==9647==    by 0x427FD2: execpline (exec.c:1484)
==9647==    by 0x427756: execlist (exec.c:1267)
==9647==    by 0x42717C: execode (exec.c:1073)
==9647==    by 0x431299: runshfunc (exec.c:5040)
==9647==    by 0x430E76: doshfunc (exec.c:4920)
==9647==    by 0x4302FB: execshfunc (exec.c:4557)
==9647==    by 0x42D8C1: execcmd (exec.c:3373)
==9647== 
==9647== 
==9647== 2 errors in context 2 of 2:
==9647== Conditional jump or move depends on uninitialised value(s)
==9647==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9647==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9647==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9647==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9647==    by 0x42D8E9: execcmd (exec.c:3378)
==9647==    by 0x428CA0: execpline2 (exec.c:1697)
==9647==    by 0x427FD2: execpline (exec.c:1484)
==9647==    by 0x42779A: execlist (exec.c:1275)
==9647==    by 0x42717C: execode (exec.c:1073)
==9647==    by 0x431299: runshfunc (exec.c:5040)
==9647==    by 0x430E76: doshfunc (exec.c:4920)
==9647==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9647== 
==9647== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF617C,  len 4
==9649== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9649-by-pythonnut-on-???
==9649== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9649-by-pythonnut-on-???
==9649== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9649-by-pythonnut-on-???
==9649== 
==9649== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9649== don't want to do, unless you know exactly what you're doing,
==9649== or are doing some strange experiment):
==9649==   /usr/lib/valgrind/../../bin/vgdb --pid=9649 ...command...
==9649== 
==9649== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9649==   /path/to/gdb ./zsh
==9649== and then give GDB the following command
==9649==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9649
==9649== --pid is optional if only one valgrind process is running
==9649== 
==9651== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9651-by-pythonnut-on-???
==9651== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9651-by-pythonnut-on-???
==9651== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9651-by-pythonnut-on-???
==9651== 
==9651== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9651== don't want to do, unless you know exactly what you're doing,
==9651== or are doing some strange experiment):
==9651==   /usr/lib/valgrind/../../bin/vgdb --pid=9651 ...command...
==9651== 
==9651== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9651==   /path/to/gdb ./zsh
==9651== and then give GDB the following command
==9651==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9651
==9651== --pid is optional if only one valgrind process is running
==9651== 
==9652== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9652-by-pythonnut-on-???
==9652== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9652-by-pythonnut-on-???
==9652== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9652-by-pythonnut-on-???
==9652== 
==9652== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9652== don't want to do, unless you know exactly what you're doing,
==9652== or are doing some strange experiment):
==9652==   /usr/lib/valgrind/../../bin/vgdb --pid=9652 ...command...
==9652== 
==9652== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9652==   /path/to/gdb ./zsh
==9652== and then give GDB the following command
==9652==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9652
==9652== --pid is optional if only one valgrind process is running
==9652== 
==9653== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9653-by-pythonnut-on-???
==9653== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9653-by-pythonnut-on-???
==9653== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9653-by-pythonnut-on-???
==9653== 
==9653== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9653== don't want to do, unless you know exactly what you're doing,
==9653== or are doing some strange experiment):
==9653==   /usr/lib/valgrind/../../bin/vgdb --pid=9653 ...command...
==9653== 
--9652-- Caught __NR_exit; running __libc_freeres()
==9653== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9653==   /path/to/gdb ./zsh
==9653== and then give GDB the following command
==9653==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9653
==9653== --pid is optional if only one valgrind process is running
==9653== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9656== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9656-by-pythonnut-on-???
==9656== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9656-by-pythonnut-on-???
==9656== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9656-by-pythonnut-on-???
==9656== 
==9656== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9656== don't want to do, unless you know exactly what you're doing,
==9656== or are doing some strange experiment):
==9656==   /usr/lib/valgrind/../../bin/vgdb --pid=9656 ...command...
==9656== 
==9656== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9656==   /path/to/gdb ./zsh
==9656== and then give GDB the following command
==9656==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9656
==9656== --pid is optional if only one valgrind process is running
==9656== 
--9652-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9652== 
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
==9652== HEAP SUMMARY:
==9652==     in use at exit: 3,120,381 bytes in 68,961 blocks
==9652==   total heap usage: 1,463,632 allocs, 1,394,671 frees, 117,717,222 bytes allocated
==9652== 
==9655== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9655-by-pythonnut-on-???
==9655== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9655-by-pythonnut-on-???
==9655== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9655-by-pythonnut-on-???
==9655== 
==9655== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9655== don't want to do, unless you know exactly what you're doing,
==9655== or are doing some strange experiment):
==9655==   /usr/lib/valgrind/../../bin/vgdb --pid=9655 ...command...
==9655== 
==9655== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9655==   /path/to/gdb ./zsh
==9655== and then give GDB the following command
==9655==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9655
==9655== --pid is optional if only one valgrind process is running
==9655== 
--9655-- Caught __NR_exit; running __libc_freeres()
==9652== Searching for pointers to 68,961 not-freed blocks
--9652--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9652--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9652--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9652--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9652--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9652--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9652--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9652--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9652--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9652--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9652--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9652--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9652--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9652--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9652--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9652--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9652--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9652--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9652--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9652--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9652--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9652--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9652--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9652--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9652--   Scanning root segment: 0x701a000..0x701afff (4096)
--9652--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9652--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9652--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9652--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9652--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9652--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9652--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9652--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9652--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9655-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9655== 
==9655== HEAP SUMMARY:
==9655==     in use at exit: 3,121,608 bytes in 68,950 blocks
==9655==   total heap usage: 1,463,622 allocs, 1,394,672 frees, 117,959,498 bytes allocated
==9655== 
==9655== Searching for pointers to 68,950 not-freed blocks
--9655--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9655--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9655--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9655--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9655--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9655--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9655--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9655--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9655--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9655--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9655--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9655--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9655--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9655--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9655--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9655--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9655--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9655--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9655--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9655--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9655--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9655--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9655--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9655--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9655--   Scanning root segment: 0x701a000..0x701afff (4096)
--9655--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9655--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9655--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9655--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9655--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9655--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9655--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9655--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9655--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9652== Checked 4,782,512 bytes
==9652== 
==9652== LEAK SUMMARY:
==9652==    definitely lost: 2,181 bytes in 11 blocks
==9652==    indirectly lost: 6,756 bytes in 7 blocks
==9652==      possibly lost: 0 bytes in 0 blocks
==9652==    still reachable: 3,111,444 bytes in 68,943 blocks
==9652==         suppressed: 0 bytes in 0 blocks
==9652== Rerun with --leak-check=full to see details of leaked memory
==9652== 
==9652== Use --track-origins=yes to see where uninitialised values come from
==9652== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9652== 
==9652== 1 errors in context 1 of 2:
==9652== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9652==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9652==    by 0x488CD0: stringsubst (subst.c:301)
==9652==    by 0x48801B: prefork (subst.c:77)
==9652==    by 0x42B318: execcmd (exec.c:2619)
==9652==    by 0x428CA0: execpline2 (exec.c:1697)
==9652==    by 0x427FD2: execpline (exec.c:1484)
==9652==    by 0x427756: execlist (exec.c:1267)
==9652==    by 0x42717C: execode (exec.c:1073)
==9652==    by 0x431299: runshfunc (exec.c:5040)
==9652==    by 0x430E76: doshfunc (exec.c:4920)
==9652==    by 0x4302FB: execshfunc (exec.c:4557)
==9652==    by 0x42D8C1: execcmd (exec.c:3373)
==9652== 
==9652== 
==9652== 2 errors in context 2 of 2:
==9652== Conditional jump or move depends on uninitialised value(s)
==9652==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9652==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9652==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9652==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9652==    by 0x42D8E9: execcmd (exec.c:3378)
==9652==    by 0x428CA0: execpline2 (exec.c:1697)
==9652==    by 0x427FD2: execpline (exec.c:1484)
==9652==    by 0x42779A: execlist (exec.c:1275)
==9652==    by 0x42717C: execode (exec.c:1073)
==9652==    by 0x431299: runshfunc (exec.c:5040)
==9652==    by 0x430E76: doshfunc (exec.c:4920)
==9652==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9652== 
==9652== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9650-- Caught __NR_exit; running __libc_freeres()
==9655== Checked 4,768,408 bytes
==9655== 
==9650== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9650-by-pythonnut-on-???
==9650== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9650-by-pythonnut-on-???
==9650== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9650-by-pythonnut-on-???
==9650== 
==9650== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9650== don't want to do, unless you know exactly what you're doing,
==9650== or are doing some strange experiment):
==9650==   /usr/lib/valgrind/../../bin/vgdb --pid=9650 ...command...
==9650== 
==9650== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9650==   /path/to/gdb ./zsh
==9650== and then give GDB the following command
==9650==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9650
==9650== --pid is optional if only one valgrind process is running
==9650== 
==9655== LEAK SUMMARY:
==9655==    definitely lost: 2,181 bytes in 11 blocks
==9655==    indirectly lost: 6,756 bytes in 7 blocks
==9655==      possibly lost: 0 bytes in 0 blocks
==9655==    still reachable: 3,112,671 bytes in 68,932 blocks
==9655==         suppressed: 0 bytes in 0 blocks
==9655== Rerun with --leak-check=full to see details of leaked memory
==9655== 
==9655== Use --track-origins=yes to see where uninitialised values come from
==9655== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9655== 
==9655== 1 errors in context 1 of 2:
==9655== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9655==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9655==    by 0x488CD0: stringsubst (subst.c:301)
==9655==    by 0x48801B: prefork (subst.c:77)
==9655==    by 0x42B318: execcmd (exec.c:2619)
==9655==    by 0x428CA0: execpline2 (exec.c:1697)
==9655==    by 0x427FD2: execpline (exec.c:1484)
==9655==    by 0x427756: execlist (exec.c:1267)
==9655==    by 0x42717C: execode (exec.c:1073)
==9655==    by 0x431299: runshfunc (exec.c:5040)
==9655==    by 0x430E76: doshfunc (exec.c:4920)
==9655==    by 0x4302FB: execshfunc (exec.c:4557)
==9655==    by 0x42D8C1: execcmd (exec.c:3373)
==9655== 
==9655== 
==9655== 2 errors in context 2 of 2:
==9655== Conditional jump or move depends on uninitialised value(s)
==9655==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9655==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9655==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9655==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9655==    by 0x42D8E9: execcmd (exec.c:3378)
==9655==    by 0x428CA0: execpline2 (exec.c:1697)
==9655==    by 0x427FD2: execpline (exec.c:1484)
==9655==    by 0x42779A: execlist (exec.c:1275)
==9655==    by 0x42717C: execode (exec.c:1073)
==9655==    by 0x431299: runshfunc (exec.c:5040)
==9655==    by 0x430E76: doshfunc (exec.c:4920)
==9655==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9655== 
==9655== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9650-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9650== 
==9650== HEAP SUMMARY:
==9650==     in use at exit: 3,120,317 bytes in 68,958 blocks
==9650==   total heap usage: 1,463,630 allocs, 1,394,672 frees, 117,716,981 bytes allocated
==9650== 
--9657-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9657== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9657-by-pythonnut-on-???
==9657== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9657-by-pythonnut-on-???
==9657== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9657-by-pythonnut-on-???
==9657== 
==9657== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9657== don't want to do, unless you know exactly what you're doing,
==9657== or are doing some strange experiment):
==9657==   /usr/lib/valgrind/../../bin/vgdb --pid=9657 ...command...
==9657== 
==9657== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9657==   /path/to/gdb ./zsh
==9657== and then give GDB the following command
==9657==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9657
==9657== --pid is optional if only one valgrind process is running
==9657== 
client request: code 4d430005,  addr 0xFFEFF8FCC,  len 4
==9650== Searching for pointers to 68,958 not-freed blocks
--9650--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9650--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9650--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9650--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9650--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9650--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9650--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9650--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9650--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9650--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9650--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9650--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9650--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9650--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9650--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9650--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9650--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9650--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9650--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9650--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9650--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9650--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9650--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9650--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9650--   Scanning root segment: 0x701a000..0x701afff (4096)
--9650--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9650--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9650--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9650--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9650--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9650--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9650--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9650--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9650--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF5FBC,  len 4
==9650== Checked 4,781,824 bytes
==9650== 
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
==9650== LEAK SUMMARY:
==9650==    definitely lost: 2,181 bytes in 11 blocks
==9650==    indirectly lost: 6,756 bytes in 7 blocks
==9650==      possibly lost: 0 bytes in 0 blocks
==9650==    still reachable: 3,111,380 bytes in 68,940 blocks
==9650==         suppressed: 0 bytes in 0 blocks
==9650== Rerun with --leak-check=full to see details of leaked memory
==9650== 
==9650== Use --track-origins=yes to see where uninitialised values come from
==9650== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9650== 
==9650== 1 errors in context 1 of 2:
==9650== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9650==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9650==    by 0x488CD0: stringsubst (subst.c:301)
==9650==    by 0x48801B: prefork (subst.c:77)
==9650==    by 0x42B318: execcmd (exec.c:2619)
==9650==    by 0x428CA0: execpline2 (exec.c:1697)
==9650==    by 0x427FD2: execpline (exec.c:1484)
==9650==    by 0x427756: execlist (exec.c:1267)
==9650==    by 0x42717C: execode (exec.c:1073)
==9650==    by 0x431299: runshfunc (exec.c:5040)
==9650==    by 0x430E76: doshfunc (exec.c:4920)
==9650==    by 0x4302FB: execshfunc (exec.c:4557)
==9650==    by 0x42D8C1: execcmd (exec.c:3373)
==9650== 
==9650== 
==9650== 2 errors in context 2 of 2:
==9650== Conditional jump or move depends on uninitialised value(s)
==9650==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9650==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9650==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9650==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9650==    by 0x42D8E9: execcmd (exec.c:3378)
==9650==    by 0x428CA0: execpline2 (exec.c:1697)
==9650==    by 0x427FD2: execpline (exec.c:1484)
==9650==    by 0x42779A: execlist (exec.c:1275)
==9650==    by 0x42717C: execode (exec.c:1073)
==9650==    by 0x431299: runshfunc (exec.c:5040)
==9650==    by 0x430E76: doshfunc (exec.c:4920)
==9650==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9650== 
==9650== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF65AC,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
--9658-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEC84C,  len 4
==9658== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9658-by-pythonnut-on-???
==9658== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9658-by-pythonnut-on-???
==9658== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9658-by-pythonnut-on-???
==9658== 
==9658== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9658== don't want to do, unless you know exactly what you're doing,
==9658== or are doing some strange experiment):
==9658==   /usr/lib/valgrind/../../bin/vgdb --pid=9658 ...command...
==9658== 
==9658== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9658==   /path/to/gdb ./zsh
==9658== and then give GDB the following command
==9658==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9658
==9658== --pid is optional if only one valgrind process is running
==9658== 
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
--9658-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9660== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9660-by-pythonnut-on-???
==9660== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9660-by-pythonnut-on-???
==9660== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9660-by-pythonnut-on-???
==9660== 
==9660== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9660== don't want to do, unless you know exactly what you're doing,
==9660== or are doing some strange experiment):
==9660==   /usr/lib/valgrind/../../bin/vgdb --pid=9660 ...command...
==9660== 
==9660== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9660==   /path/to/gdb ./zsh
==9660== and then give GDB the following command
==9660==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9660
==9660== --pid is optional if only one valgrind process is running
==9660== 
==9658== 
==9658== HEAP SUMMARY:
==9658==     in use at exit: 3,120,324 bytes in 68,958 blocks
==9658==   total heap usage: 1,463,645 allocs, 1,394,687 frees, 117,721,979 bytes allocated
==9658== 
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
==9661== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9661-by-pythonnut-on-???
==9661== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9661-by-pythonnut-on-???
==9661== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9661-by-pythonnut-on-???
==9661== 
==9661== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9661== don't want to do, unless you know exactly what you're doing,
==9661== or are doing some strange experiment):
==9661==   /usr/lib/valgrind/../../bin/vgdb --pid=9661 ...command...
==9661== 
==9661== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9661==   /path/to/gdb ./zsh
==9661== and then give GDB the following command
==9661==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9661
==9661== --pid is optional if only one valgrind process is running
==9661== 
==9658== Searching for pointers to 68,958 not-freed blocks
--9658--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9658--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9658--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9658--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9658--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9658--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9658--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9658--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9658--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9658--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9658--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9658--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9658--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9658--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9658--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9658--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9658--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9658--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9658--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9658--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9658--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9658--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9658--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9658--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9658--   Scanning root segment: 0x701a000..0x701afff (4096)
--9658--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9658--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9658--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9658--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9658--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9658--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9658--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9658--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9658--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9661-- Caught __NR_exit; running __libc_freeres()
--9661-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9661== 
==9661== HEAP SUMMARY:
==9661==     in use at exit: 3,153,255 bytes in 69,448 blocks
==9661==   total heap usage: 1,467,399 allocs, 1,397,951 frees, 119,729,617 bytes allocated
==9661== 
==9661== Searching for pointers to 69,448 not-freed blocks
--9661--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9661--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9661--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9661--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9661--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9661--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9661--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9661--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9661--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9661--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9661--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9661--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9661--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9661--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9661--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9661--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9661--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9661--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9661--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9661--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9661--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9661--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9661--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9661--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9661--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9661--   Scanning root segment: 0x701a000..0x701afff (4096)
--9661--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9661--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9661--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9661--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9661--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9661--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9661--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9661--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9661--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9658== Checked 4,781,960 bytes
==9658== 
==9658== LEAK SUMMARY:
==9658==    definitely lost: 2,181 bytes in 11 blocks
==9658==    indirectly lost: 6,756 bytes in 7 blocks
==9658==      possibly lost: 0 bytes in 0 blocks
==9658==    still reachable: 3,111,387 bytes in 68,940 blocks
==9658==         suppressed: 0 bytes in 0 blocks
==9658== Rerun with --leak-check=full to see details of leaked memory
==9658== 
==9658== Use --track-origins=yes to see where uninitialised values come from
==9658== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9658== 
==9658== 1 errors in context 1 of 2:
==9658== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9658==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9658==    by 0x488CD0: stringsubst (subst.c:301)
==9658==    by 0x48801B: prefork (subst.c:77)
==9658==    by 0x42B318: execcmd (exec.c:2619)
==9658==    by 0x428CA0: execpline2 (exec.c:1697)
==9658==    by 0x427FD2: execpline (exec.c:1484)
==9658==    by 0x427756: execlist (exec.c:1267)
==9658==    by 0x42717C: execode (exec.c:1073)
==9658==    by 0x431299: runshfunc (exec.c:5040)
==9658==    by 0x430E76: doshfunc (exec.c:4920)
==9658==    by 0x4302FB: execshfunc (exec.c:4557)
==9658==    by 0x42D8C1: execcmd (exec.c:3373)
==9658== 
==9658== 
==9658== 2 errors in context 2 of 2:
==9658== Conditional jump or move depends on uninitialised value(s)
==9658==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9658==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9658==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9658==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9658==    by 0x42D8E9: execcmd (exec.c:3378)
==9658==    by 0x428CA0: execpline2 (exec.c:1697)
==9658==    by 0x427FD2: execpline (exec.c:1484)
==9658==    by 0x42779A: execlist (exec.c:1275)
==9658==    by 0x42717C: execode (exec.c:1073)
==9658==    by 0x431299: runshfunc (exec.c:5040)
==9658==    by 0x430E76: doshfunc (exec.c:4920)
==9658==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9658== 
==9658== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9664-- Caught __NR_exit; running __libc_freeres()
==9664== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9664-by-pythonnut-on-???
==9664== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9664-by-pythonnut-on-???
==9664== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9664-by-pythonnut-on-???
==9664== 
==9664== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9664== don't want to do, unless you know exactly what you're doing,
==9664== or are doing some strange experiment):
==9664==   /usr/lib/valgrind/../../bin/vgdb --pid=9664 ...command...
==9664== 
==9664== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9664==   /path/to/gdb ./zsh
==9664== and then give GDB the following command
==9664==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9664
==9664== --pid is optional if only one valgrind process is running
==9664== 
--9664-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9661== Checked 4,856,456 bytes
==9661== 
==9664== 
==9664== HEAP SUMMARY:
==9664==     in use at exit: 3,120,484 bytes in 68,959 blocks
==9664==   total heap usage: 1,463,662 allocs, 1,394,703 frees, 117,726,830 bytes allocated
==9664== 
==9661== LEAK SUMMARY:
==9661==    definitely lost: 2,181 bytes in 11 blocks
==9661==    indirectly lost: 6,756 bytes in 7 blocks
==9661==      possibly lost: 0 bytes in 0 blocks
==9661==    still reachable: 3,144,318 bytes in 69,430 blocks
==9661==         suppressed: 0 bytes in 0 blocks
==9661== Rerun with --leak-check=full to see details of leaked memory
==9661== 
==9661== Use --track-origins=yes to see where uninitialised values come from
==9661== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9661== 
==9661== 1 errors in context 1 of 2:
==9661== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9661==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9661==    by 0x488CD0: stringsubst (subst.c:301)
==9661==    by 0x48801B: prefork (subst.c:77)
==9661==    by 0x42B318: execcmd (exec.c:2619)
==9661==    by 0x428CA0: execpline2 (exec.c:1697)
==9661==    by 0x427FD2: execpline (exec.c:1484)
==9661==    by 0x427756: execlist (exec.c:1267)
==9661==    by 0x42717C: execode (exec.c:1073)
==9661==    by 0x431299: runshfunc (exec.c:5040)
==9661==    by 0x430E76: doshfunc (exec.c:4920)
==9661==    by 0x4302FB: execshfunc (exec.c:4557)
==9661==    by 0x42D8C1: execcmd (exec.c:3373)
==9661== 
==9661== 
==9661== 2 errors in context 2 of 2:
==9661== Conditional jump or move depends on uninitialised value(s)
==9661==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9661==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9661==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9661==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9661==    by 0x42D8E9: execcmd (exec.c:3378)
==9661==    by 0x428CA0: execpline2 (exec.c:1697)
==9661==    by 0x427FD2: execpline (exec.c:1484)
==9661==    by 0x42779A: execlist (exec.c:1275)
==9661==    by 0x42717C: execode (exec.c:1073)
==9661==    by 0x431299: runshfunc (exec.c:5040)
==9661==    by 0x430E76: doshfunc (exec.c:4920)
==9661==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9661== 
==9661== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9660-- Caught __NR_exit; running __libc_freeres()
==9664== Searching for pointers to 68,959 not-freed blocks
--9664--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9664--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9664--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9664--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9664--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9664--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9664--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9664--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9664--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9664--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9664--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9664--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9664--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9664--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9664--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9664--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9664--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9664--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9664--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9664--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9664--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9664--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9664--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9664--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9664--   Scanning root segment: 0x701a000..0x701afff (4096)
--9664--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9664--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9664--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9664--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9664--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9664--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9664--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9664--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9664--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9660-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9660== 
==9660== HEAP SUMMARY:
==9660==     in use at exit: 3,150,973 bytes in 69,368 blocks
==9660==   total heap usage: 1,467,304 allocs, 1,397,936 frees, 119,497,678 bytes allocated
==9660== 
==9660== Searching for pointers to 69,368 not-freed blocks
--9660--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9660--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9660--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9660--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9660--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9660--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9660--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9660--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9660--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9660--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9660--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9660--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9660--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9660--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9660--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9660--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9660--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9660--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9660--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9660--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9660--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9660--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9660--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9660--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9660--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9660--   Scanning root segment: 0x701a000..0x701afff (4096)
--9660--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9660--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9660--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9660--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9660--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9660--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9660--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9660--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9660--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9664== Checked 4,781,304 bytes
==9664== 
==9664== LEAK SUMMARY:
==9664==    definitely lost: 2,181 bytes in 11 blocks
==9664==    indirectly lost: 6,756 bytes in 7 blocks
==9664==      possibly lost: 0 bytes in 0 blocks
==9664==    still reachable: 3,111,547 bytes in 68,941 blocks
==9664==         suppressed: 0 bytes in 0 blocks
==9664== Rerun with --leak-check=full to see details of leaked memory
==9664== 
==9664== Use --track-origins=yes to see where uninitialised values come from
==9664== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9664== 
==9664== 1 errors in context 1 of 2:
==9664== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9664==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9664==    by 0x488CD0: stringsubst (subst.c:301)
==9664==    by 0x48801B: prefork (subst.c:77)
==9664==    by 0x42B318: execcmd (exec.c:2619)
==9664==    by 0x428CA0: execpline2 (exec.c:1697)
==9664==    by 0x427FD2: execpline (exec.c:1484)
==9664==    by 0x427756: execlist (exec.c:1267)
==9664==    by 0x42717C: execode (exec.c:1073)
==9664==    by 0x431299: runshfunc (exec.c:5040)
==9664==    by 0x430E76: doshfunc (exec.c:4920)
==9664==    by 0x4302FB: execshfunc (exec.c:4557)
==9664==    by 0x42D8C1: execcmd (exec.c:3373)
==9664== 
==9664== 
==9664== 2 errors in context 2 of 2:
==9664== Conditional jump or move depends on uninitialised value(s)
==9664==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9664==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9664==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9664==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9664==    by 0x42D8E9: execcmd (exec.c:3378)
==9664==    by 0x428CA0: execpline2 (exec.c:1697)
==9664==    by 0x427FD2: execpline (exec.c:1484)
==9664==    by 0x42779A: execlist (exec.c:1275)
==9664==    by 0x42717C: execode (exec.c:1073)
==9664==    by 0x431299: runshfunc (exec.c:5040)
==9664==    by 0x430E76: doshfunc (exec.c:4920)
==9664==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9664== 
==9664== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9665== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9665-by-pythonnut-on-???
==9665== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9665-by-pythonnut-on-???
==9665== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9665-by-pythonnut-on-???
==9665== 
==9665== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9665== don't want to do, unless you know exactly what you're doing,
==9665== or are doing some strange experiment):
==9665==   /usr/lib/valgrind/../../bin/vgdb --pid=9665 ...command...
==9665== 
==9665== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9665==   /path/to/gdb ./zsh
==9665== and then give GDB the following command
==9665==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9665
==9665== --pid is optional if only one valgrind process is running
==9665== 
--9665-- Caught __NR_exit; running __libc_freeres()
==9660== Checked 4,852,480 bytes
==9660== 
--9665-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9665== 
==9665== HEAP SUMMARY:
==9665==     in use at exit: 3,120,658 bytes in 68,964 blocks
==9665==   total heap usage: 1,463,709 allocs, 1,394,745 frees, 117,735,782 bytes allocated
==9665== 
==9660== LEAK SUMMARY:
==9660==    definitely lost: 2,181 bytes in 11 blocks
==9660==    indirectly lost: 6,756 bytes in 7 blocks
==9660==      possibly lost: 0 bytes in 0 blocks
==9660==    still reachable: 3,142,036 bytes in 69,350 blocks
==9660==         suppressed: 0 bytes in 0 blocks
==9660== Rerun with --leak-check=full to see details of leaked memory
==9660== 
==9660== Use --track-origins=yes to see where uninitialised values come from
==9660== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9660== 
==9660== 1 errors in context 1 of 2:
==9660== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9660==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9660==    by 0x488CD0: stringsubst (subst.c:301)
==9660==    by 0x48801B: prefork (subst.c:77)
==9660==    by 0x42B318: execcmd (exec.c:2619)
==9660==    by 0x428CA0: execpline2 (exec.c:1697)
==9660==    by 0x427FD2: execpline (exec.c:1484)
==9660==    by 0x427756: execlist (exec.c:1267)
==9660==    by 0x42717C: execode (exec.c:1073)
==9660==    by 0x431299: runshfunc (exec.c:5040)
==9660==    by 0x430E76: doshfunc (exec.c:4920)
==9660==    by 0x4302FB: execshfunc (exec.c:4557)
==9660==    by 0x42D8C1: execcmd (exec.c:3373)
==9660== 
==9660== 
==9660== 2 errors in context 2 of 2:
==9660== Conditional jump or move depends on uninitialised value(s)
==9660==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9660==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9660==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9660==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9660==    by 0x42D8E9: execcmd (exec.c:3378)
==9660==    by 0x428CA0: execpline2 (exec.c:1697)
==9660==    by 0x427FD2: execpline (exec.c:1484)
==9660==    by 0x42779A: execlist (exec.c:1275)
==9660==    by 0x42717C: execode (exec.c:1073)
==9660==    by 0x431299: runshfunc (exec.c:5040)
==9660==    by 0x430E76: doshfunc (exec.c:4920)
==9660==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9660== 
==9660== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9666== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9666-by-pythonnut-on-???
==9666== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9666-by-pythonnut-on-???
==9666== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9666-by-pythonnut-on-???
==9666== 
==9666== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9666== don't want to do, unless you know exactly what you're doing,
==9666== or are doing some strange experiment):
==9666==   /usr/lib/valgrind/../../bin/vgdb --pid=9666 ...command...
==9666== 
==9666== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9666==   /path/to/gdb ./zsh
==9666== and then give GDB the following command
==9666==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9666
==9666== --pid is optional if only one valgrind process is running
==9666== 
==9665== Searching for pointers to 68,964 not-freed blocks
--9665--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9665--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9665--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9665--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9665--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9665--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9665--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9665--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9665--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9665--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9665--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9665--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9665--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9665--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9665--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9665--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9665--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9665--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9665--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9665--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9665--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9665--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9665--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9665--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9665--   Scanning root segment: 0x701a000..0x701afff (4096)
--9665--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9665--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9665--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9665--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9665--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9665--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9665--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9665--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9665--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==9667== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9667-by-pythonnut-on-???
==9667== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9667-by-pythonnut-on-???
==9667== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9667-by-pythonnut-on-???
==9667== 
==9667== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9667== don't want to do, unless you know exactly what you're doing,
==9667== or are doing some strange experiment):
==9667==   /usr/lib/valgrind/../../bin/vgdb --pid=9667 ...command...
==9667== 
==9667== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9667==   /path/to/gdb ./zsh
==9667== and then give GDB the following command
==9667==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9667
==9667== --pid is optional if only one valgrind process is running
==9667== 
--9667-- Caught __NR_exit; running __libc_freeres()
--9667-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9667== 
==9667== HEAP SUMMARY:
==9667==     in use at exit: 3,153,502 bytes in 69,456 blocks
==9667==   total heap usage: 1,467,416 allocs, 1,397,960 frees, 119,699,788 bytes allocated
==9667== 
==9667== Searching for pointers to 69,456 not-freed blocks
--9667--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9667--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9667--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9667--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9667--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9667--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9667--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9667--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9667--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9667--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9667--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9667--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9667--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9667--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9667--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9667--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9667--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9667--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9667--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9667--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9667--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9667--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9667--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9667--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9667--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9667--   Scanning root segment: 0x701a000..0x701afff (4096)
--9667--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9667--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9667--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9667--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9667--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9667--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9667--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9667--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9667--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9665== Checked 4,781,384 bytes
==9665== 
==9665== LEAK SUMMARY:
==9665==    definitely lost: 2,181 bytes in 11 blocks
==9665==    indirectly lost: 6,756 bytes in 7 blocks
==9665==      possibly lost: 0 bytes in 0 blocks
==9665==    still reachable: 3,111,721 bytes in 68,946 blocks
==9665==         suppressed: 0 bytes in 0 blocks
==9665== Rerun with --leak-check=full to see details of leaked memory
==9665== 
==9665== Use --track-origins=yes to see where uninitialised values come from
==9665== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9665== 
==9665== 1 errors in context 1 of 2:
==9665== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9665==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9665==    by 0x488CD0: stringsubst (subst.c:301)
==9665==    by 0x48801B: prefork (subst.c:77)
==9665==    by 0x42B318: execcmd (exec.c:2619)
==9665==    by 0x428CA0: execpline2 (exec.c:1697)
==9665==    by 0x427FD2: execpline (exec.c:1484)
==9665==    by 0x427756: execlist (exec.c:1267)
==9665==    by 0x42717C: execode (exec.c:1073)
==9665==    by 0x431299: runshfunc (exec.c:5040)
==9665==    by 0x430E76: doshfunc (exec.c:4920)
==9665==    by 0x4302FB: execshfunc (exec.c:4557)
==9665==    by 0x42D8C1: execcmd (exec.c:3373)
==9665== 
==9665== 
==9665== 2 errors in context 2 of 2:
==9665== Conditional jump or move depends on uninitialised value(s)
==9665==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9665==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9665==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9665==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9665==    by 0x42D8E9: execcmd (exec.c:3378)
==9665==    by 0x428CA0: execpline2 (exec.c:1697)
==9665==    by 0x427FD2: execpline (exec.c:1484)
==9665==    by 0x42779A: execlist (exec.c:1275)
==9665==    by 0x42717C: execode (exec.c:1073)
==9665==    by 0x431299: runshfunc (exec.c:5040)
==9665==    by 0x430E76: doshfunc (exec.c:4920)
==9665==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9665== 
==9665== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9668-- Caught __NR_exit; running __libc_freeres()
==9668== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9668-by-pythonnut-on-???
==9668== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9668-by-pythonnut-on-???
==9668== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9668-by-pythonnut-on-???
==9668== 
==9668== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9668== don't want to do, unless you know exactly what you're doing,
==9668== or are doing some strange experiment):
==9668==   /usr/lib/valgrind/../../bin/vgdb --pid=9668 ...command...
==9668== 
==9668== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9668==   /path/to/gdb ./zsh
==9668== and then give GDB the following command
==9668==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9668
==9668== --pid is optional if only one valgrind process is running
==9668== 
--9668-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9668== 
==9668== HEAP SUMMARY:
==9668==     in use at exit: 3,120,594 bytes in 68,964 blocks
==9668==   total heap usage: 1,463,689 allocs, 1,394,725 frees, 117,733,552 bytes allocated
==9668== 
==9667== Checked 4,857,184 bytes
==9667== 
==9668== Searching for pointers to 68,964 not-freed blocks
--9668--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9668--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9668--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9668--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9668--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9668--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9668--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9668--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9668--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9668--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9668--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9668--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9668--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9668--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9668--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9668--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9668--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9668--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9668--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9668--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9668--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9668--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9668--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9668--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9668--   Scanning root segment: 0x701a000..0x701afff (4096)
--9668--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9668--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9668--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9668--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9668--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9668--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9668--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9668--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9668--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9667== LEAK SUMMARY:
==9667==    definitely lost: 2,181 bytes in 11 blocks
==9667==    indirectly lost: 6,756 bytes in 7 blocks
==9667==      possibly lost: 0 bytes in 0 blocks
==9667==    still reachable: 3,144,565 bytes in 69,438 blocks
==9667==         suppressed: 0 bytes in 0 blocks
==9667== Rerun with --leak-check=full to see details of leaked memory
==9667== 
==9667== Use --track-origins=yes to see where uninitialised values come from
==9667== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9667== 
==9667== 1 errors in context 1 of 2:
==9667== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9667==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9667==    by 0x488CD0: stringsubst (subst.c:301)
==9667==    by 0x48801B: prefork (subst.c:77)
==9667==    by 0x42B318: execcmd (exec.c:2619)
==9667==    by 0x428CA0: execpline2 (exec.c:1697)
==9667==    by 0x427FD2: execpline (exec.c:1484)
==9667==    by 0x427756: execlist (exec.c:1267)
==9667==    by 0x42717C: execode (exec.c:1073)
==9667==    by 0x431299: runshfunc (exec.c:5040)
==9667==    by 0x430E76: doshfunc (exec.c:4920)
==9667==    by 0x4302FB: execshfunc (exec.c:4557)
==9667==    by 0x42D8C1: execcmd (exec.c:3373)
==9667== 
==9667== 
==9667== 2 errors in context 2 of 2:
==9667== Conditional jump or move depends on uninitialised value(s)
==9667==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9667==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9667==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9667==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9667==    by 0x42D8E9: execcmd (exec.c:3378)
==9667==    by 0x428CA0: execpline2 (exec.c:1697)
==9667==    by 0x427FD2: execpline (exec.c:1484)
==9667==    by 0x42779A: execlist (exec.c:1275)
==9667==    by 0x42717C: execode (exec.c:1073)
==9667==    by 0x431299: runshfunc (exec.c:5040)
==9667==    by 0x430E76: doshfunc (exec.c:4920)
==9667==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9667== 
==9667== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9666-- Caught __NR_exit; running __libc_freeres()
--9666-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9666== 
==9666== HEAP SUMMARY:
==9666==     in use at exit: 3,151,246 bytes in 69,376 blocks
==9666==   total heap usage: 1,467,319 allocs, 1,397,943 frees, 119,500,591 bytes allocated
==9666== 
==9666== Searching for pointers to 69,376 not-freed blocks
--9666--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9666--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9666--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9666--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9666--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9666--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9666--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9666--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9666--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9666--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9666--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9666--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9666--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9666--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9666--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9666--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9666--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9666--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9666--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9666--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9666--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9666--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9666--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9666--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9666--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9666--   Scanning root segment: 0x701a000..0x701afff (4096)
--9666--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9666--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9666--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9666--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9666--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9666--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9666--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9666--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9666--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9668== Checked 4,781,336 bytes
==9668== 
==9668== LEAK SUMMARY:
==9668==    definitely lost: 2,181 bytes in 11 blocks
==9668==    indirectly lost: 6,756 bytes in 7 blocks
==9668==      possibly lost: 0 bytes in 0 blocks
==9668==    still reachable: 3,111,657 bytes in 68,946 blocks
==9668==         suppressed: 0 bytes in 0 blocks
==9668== Rerun with --leak-check=full to see details of leaked memory
==9668== 
==9668== Use --track-origins=yes to see where uninitialised values come from
==9668== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9668== 
==9668== 1 errors in context 1 of 2:
==9668== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9668==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9668==    by 0x488CD0: stringsubst (subst.c:301)
==9668==    by 0x48801B: prefork (subst.c:77)
==9668==    by 0x42B318: execcmd (exec.c:2619)
==9668==    by 0x428CA0: execpline2 (exec.c:1697)
==9668==    by 0x427FD2: execpline (exec.c:1484)
==9668==    by 0x427756: execlist (exec.c:1267)
==9668==    by 0x42717C: execode (exec.c:1073)
==9668==    by 0x431299: runshfunc (exec.c:5040)
==9668==    by 0x430E76: doshfunc (exec.c:4920)
==9668==    by 0x4302FB: execshfunc (exec.c:4557)
==9668==    by 0x42D8C1: execcmd (exec.c:3373)
==9668== 
==9668== 
==9668== 2 errors in context 2 of 2:
==9668== Conditional jump or move depends on uninitialised value(s)
==9668==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9668==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9668==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9668==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9668==    by 0x42D8E9: execcmd (exec.c:3378)
==9668==    by 0x428CA0: execpline2 (exec.c:1697)
==9668==    by 0x427FD2: execpline (exec.c:1484)
==9668==    by 0x42779A: execlist (exec.c:1275)
==9668==    by 0x42717C: execode (exec.c:1073)
==9668==    by 0x431299: runshfunc (exec.c:5040)
==9668==    by 0x430E76: doshfunc (exec.c:4920)
==9668==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9668== 
==9668== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9669== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9669-by-pythonnut-on-???
==9669== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9669-by-pythonnut-on-???
==9669== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9669-by-pythonnut-on-???
==9669== 
==9669== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9669== don't want to do, unless you know exactly what you're doing,
==9669== or are doing some strange experiment):
==9669==   /usr/lib/valgrind/../../bin/vgdb --pid=9669 ...command...
==9669== 
==9669== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9669==   /path/to/gdb ./zsh
==9669== and then give GDB the following command
==9669==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9669
==9669== --pid is optional if only one valgrind process is running
==9669== 
--9669-- Caught __NR_exit; running __libc_freeres()
==9666== Checked 4,853,240 bytes
==9666== 
--9669-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9669== 
==9669== HEAP SUMMARY:
==9669==     in use at exit: 3,120,632 bytes in 68,965 blocks
==9669==   total heap usage: 1,463,702 allocs, 1,394,737 frees, 117,736,249 bytes allocated
==9669== 
==9666== LEAK SUMMARY:
==9666==    definitely lost: 2,181 bytes in 11 blocks
==9666==    indirectly lost: 6,756 bytes in 7 blocks
==9666==      possibly lost: 0 bytes in 0 blocks
==9666==    still reachable: 3,142,309 bytes in 69,358 blocks
==9666==         suppressed: 0 bytes in 0 blocks
==9666== Rerun with --leak-check=full to see details of leaked memory
==9666== 
==9666== Use --track-origins=yes to see where uninitialised values come from
==9666== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9666== 
==9666== 1 errors in context 1 of 2:
==9666== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9666==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9666==    by 0x488CD0: stringsubst (subst.c:301)
==9666==    by 0x48801B: prefork (subst.c:77)
==9666==    by 0x42B318: execcmd (exec.c:2619)
==9666==    by 0x428CA0: execpline2 (exec.c:1697)
==9666==    by 0x427FD2: execpline (exec.c:1484)
==9666==    by 0x427756: execlist (exec.c:1267)
==9666==    by 0x42717C: execode (exec.c:1073)
==9666==    by 0x431299: runshfunc (exec.c:5040)
==9666==    by 0x430E76: doshfunc (exec.c:4920)
==9666==    by 0x4302FB: execshfunc (exec.c:4557)
==9666==    by 0x42D8C1: execcmd (exec.c:3373)
==9666== 
==9666== 
==9666== 2 errors in context 2 of 2:
==9666== Conditional jump or move depends on uninitialised value(s)
==9666==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9666==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9666==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9666==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9666==    by 0x42D8E9: execcmd (exec.c:3378)
==9666==    by 0x428CA0: execpline2 (exec.c:1697)
==9666==    by 0x427FD2: execpline (exec.c:1484)
==9666==    by 0x42779A: execlist (exec.c:1275)
==9666==    by 0x42717C: execode (exec.c:1073)
==9666==    by 0x431299: runshfunc (exec.c:5040)
==9666==    by 0x430E76: doshfunc (exec.c:4920)
==9666==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9666== 
==9666== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
==9669== Searching for pointers to 68,965 not-freed blocks
--9669--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9669--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9669--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9669--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9669--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9669--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9669--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9669--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9669--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9669--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9669--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9669--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9669--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9669--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9669--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9669--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9669--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9669--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9669--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9669--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9669--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9669--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9669--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9669--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9669--   Scanning root segment: 0x701a000..0x701afff (4096)
--9669--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9669--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9669--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9669--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9669--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9669--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9669--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9669--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9669--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEC39C,  len 4
--9670-- Caught __NR_exit; running __libc_freeres()
==9670== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9670-by-pythonnut-on-???
==9670== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9670-by-pythonnut-on-???
==9670== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9670-by-pythonnut-on-???
==9670== 
==9670== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9670== don't want to do, unless you know exactly what you're doing,
==9670== or are doing some strange experiment):
==9670==   /usr/lib/valgrind/../../bin/vgdb --pid=9670 ...command...
==9670== 
==9670== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9670==   /path/to/gdb ./zsh
==9670== and then give GDB the following command
==9670==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9670
==9670== --pid is optional if only one valgrind process is running
==9670== 
--9670-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9670== 
==9670== HEAP SUMMARY:
==9670==     in use at exit: 3,153,073 bytes in 69,367 blocks
==9670==   total heap usage: 1,467,432 allocs, 1,398,065 frees, 119,516,054 bytes allocated
==9670== 
==9670== Searching for pointers to 69,367 not-freed blocks
--9670--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9670--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9670--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9670--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9670--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9670--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9670--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9670--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9670--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9670--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9670--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9670--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9670--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9670--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9670--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9670--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9670--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9670--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9670--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9670--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9670--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9670--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9670--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9670--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9670--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9670--   Scanning root segment: 0x701a000..0x701afff (4096)
--9670--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9670--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9670--   Scanning root segment: 0xae51000..0xae52fff (8192)
==9669== Checked 4,780,856 bytes
--9670--   Scanning root segment: 0xb054000..0xb054fff (4096)
==9669== 
--9670--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9670--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9670--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9670--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9670--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9669== LEAK SUMMARY:
==9669==    definitely lost: 2,181 bytes in 11 blocks
==9669==    indirectly lost: 6,756 bytes in 7 blocks
==9669==      possibly lost: 0 bytes in 0 blocks
==9669==    still reachable: 3,111,695 bytes in 68,947 blocks
==9669==         suppressed: 0 bytes in 0 blocks
==9669== Rerun with --leak-check=full to see details of leaked memory
==9669== 
==9669== Use --track-origins=yes to see where uninitialised values come from
==9669== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9669== 
==9669== 1 errors in context 1 of 2:
==9669== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9669==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9669==    by 0x488CD0: stringsubst (subst.c:301)
==9669==    by 0x48801B: prefork (subst.c:77)
==9669==    by 0x42B318: execcmd (exec.c:2619)
==9669==    by 0x428CA0: execpline2 (exec.c:1697)
==9669==    by 0x427FD2: execpline (exec.c:1484)
==9669==    by 0x427756: execlist (exec.c:1267)
==9669==    by 0x42717C: execode (exec.c:1073)
==9669==    by 0x431299: runshfunc (exec.c:5040)
==9669==    by 0x430E76: doshfunc (exec.c:4920)
==9669==    by 0x4302FB: execshfunc (exec.c:4557)
==9669==    by 0x42D8C1: execcmd (exec.c:3373)
==9669== 
==9669== 
==9669== 2 errors in context 2 of 2:
==9669== Conditional jump or move depends on uninitialised value(s)
==9669==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9669==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9669==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9669==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9669==    by 0x42D8E9: execcmd (exec.c:3378)
==9669==    by 0x428CA0: execpline2 (exec.c:1697)
==9669==    by 0x427FD2: execpline (exec.c:1484)
==9669==    by 0x42779A: execlist (exec.c:1275)
==9669==    by 0x42717C: execode (exec.c:1073)
==9669==    by 0x431299: runshfunc (exec.c:5040)
==9669==    by 0x430E76: doshfunc (exec.c:4920)
==9669==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9669== 
==9669== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9672== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9672-by-pythonnut-on-???
==9672== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9672-by-pythonnut-on-???
==9672== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9672-by-pythonnut-on-???
==9672== 
==9672== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9672== don't want to do, unless you know exactly what you're doing,
==9672== or are doing some strange experiment):
==9672==   /usr/lib/valgrind/../../bin/vgdb --pid=9672 ...command...
==9672== 
==9672== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9672==   /path/to/gdb ./zsh
==9672== and then give GDB the following command
==9672==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9672
==9672== --pid is optional if only one valgrind process is running
==9672== 
--9672-- Caught __NR_exit; running __libc_freeres()
--9672-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9672== 
==9672== HEAP SUMMARY:
==9672==     in use at exit: 3,119,143 bytes in 68,905 blocks
==9672==   total heap usage: 1,463,672 allocs, 1,394,767 frees, 117,739,247 bytes allocated
==9672== 
==9670== Checked 4,853,472 bytes
==9670== 
==9672== Searching for pointers to 68,905 not-freed blocks
--9672--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9672--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9672--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9672--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9672--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9672--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9672--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9672--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9672--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9672--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9672--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9672--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9672--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9672--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9672--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9672--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9672--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9672--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9672--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9672--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9672--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9672--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9672--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9672--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9672--   Scanning root segment: 0x701a000..0x701afff (4096)
--9672--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9672--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9672--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9672--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9672--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9672--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9672--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9672--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9672--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9670== LEAK SUMMARY:
==9670==    definitely lost: 2,181 bytes in 11 blocks
==9670==    indirectly lost: 6,756 bytes in 7 blocks
==9670==      possibly lost: 0 bytes in 0 blocks
==9670==    still reachable: 3,144,136 bytes in 69,349 blocks
==9670==         suppressed: 0 bytes in 0 blocks
==9670== Rerun with --leak-check=full to see details of leaked memory
==9670== 
==9670== Use --track-origins=yes to see where uninitialised values come from
==9670== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9670== 
==9670== 1 errors in context 1 of 2:
==9670== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9670==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9670==    by 0x488CD0: stringsubst (subst.c:301)
==9670==    by 0x48801B: prefork (subst.c:77)
==9670==    by 0x42B318: execcmd (exec.c:2619)
==9670==    by 0x428CA0: execpline2 (exec.c:1697)
==9670==    by 0x427FD2: execpline (exec.c:1484)
==9670==    by 0x427756: execlist (exec.c:1267)
==9670==    by 0x42717C: execode (exec.c:1073)
==9670==    by 0x431299: runshfunc (exec.c:5040)
==9670==    by 0x430E76: doshfunc (exec.c:4920)
==9670==    by 0x4302FB: execshfunc (exec.c:4557)
==9670==    by 0x42D8C1: execcmd (exec.c:3373)
==9670== 
==9670== 
==9670== 2 errors in context 2 of 2:
==9670== Conditional jump or move depends on uninitialised value(s)
==9670==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9670==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9670==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9670==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9670==    by 0x42D8E9: execcmd (exec.c:3378)
==9670==    by 0x428CA0: execpline2 (exec.c:1697)
==9670==    by 0x427FD2: execpline (exec.c:1484)
==9670==    by 0x42779A: execlist (exec.c:1275)
==9670==    by 0x42717C: execode (exec.c:1073)
==9670==    by 0x431299: runshfunc (exec.c:5040)
==9670==    by 0x430E76: doshfunc (exec.c:4920)
==9670==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9670== 
==9670== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9673== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9673-by-pythonnut-on-???
==9673== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9673-by-pythonnut-on-???
==9673== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9673-by-pythonnut-on-???
==9673== 
==9673== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9673== don't want to do, unless you know exactly what you're doing,
==9673== or are doing some strange experiment):
==9673==   /usr/lib/valgrind/../../bin/vgdb --pid=9673 ...command...
==9673== 
==9673== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9673==   /path/to/gdb ./zsh
==9673== and then give GDB the following command
==9673==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9673
==9673== --pid is optional if only one valgrind process is running
==9673== 
--9673-- Caught __NR_exit; running __libc_freeres()
--9673-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9673== 
==9673== HEAP SUMMARY:
==9673==     in use at exit: 3,152,257 bytes in 69,323 blocks
==9673==   total heap usage: 1,467,389 allocs, 1,398,066 frees, 119,515,536 bytes allocated
==9673== 
==9673== Searching for pointers to 69,323 not-freed blocks
--9673--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9673--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9673--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9673--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9673--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9673--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9673--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9673--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9673--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9673--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9673--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9673--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9673--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9673--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9673--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9673--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9673--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9673--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9673--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9673--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9673--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9673--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9673--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9673--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9673--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9673--   Scanning root segment: 0x701a000..0x701afff (4096)
--9673--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9673--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9673--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9673--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9673--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9673--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9673--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9673--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9673--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9672== Checked 4,780,312 bytes
==9672== 
==9672== LEAK SUMMARY:
==9672==    definitely lost: 2,181 bytes in 11 blocks
==9672==    indirectly lost: 6,756 bytes in 7 blocks
==9672==      possibly lost: 0 bytes in 0 blocks
==9672==    still reachable: 3,110,206 bytes in 68,887 blocks
==9672==         suppressed: 0 bytes in 0 blocks
==9672== Rerun with --leak-check=full to see details of leaked memory
==9672== 
==9672== Use --track-origins=yes to see where uninitialised values come from
==9672== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9672== 
==9672== 1 errors in context 1 of 2:
==9672== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9672==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9672==    by 0x488CD0: stringsubst (subst.c:301)
==9672==    by 0x48801B: prefork (subst.c:77)
==9672==    by 0x42B318: execcmd (exec.c:2619)
==9672==    by 0x428CA0: execpline2 (exec.c:1697)
==9672==    by 0x427FD2: execpline (exec.c:1484)
==9672==    by 0x427756: execlist (exec.c:1267)
==9672==    by 0x42717C: execode (exec.c:1073)
==9672==    by 0x431299: runshfunc (exec.c:5040)
==9672==    by 0x430E76: doshfunc (exec.c:4920)
==9672==    by 0x4302FB: execshfunc (exec.c:4557)
==9672==    by 0x42D8C1: execcmd (exec.c:3373)
==9672== 
==9672== 
==9672== 2 errors in context 2 of 2:
==9672== Conditional jump or move depends on uninitialised value(s)
==9672==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9672==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9672==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9672==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9672==    by 0x42D8E9: execcmd (exec.c:3378)
==9672==    by 0x428CA0: execpline2 (exec.c:1697)
==9672==    by 0x427FD2: execpline (exec.c:1484)
==9672==    by 0x42779A: execlist (exec.c:1275)
==9672==    by 0x42717C: execode (exec.c:1073)
==9672==    by 0x431299: runshfunc (exec.c:5040)
==9672==    by 0x430E76: doshfunc (exec.c:4920)
==9672==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9672== 
==9672== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9674== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9674-by-pythonnut-on-???
==9674== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9674-by-pythonnut-on-???
==9674== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9674-by-pythonnut-on-???
==9674== 
==9674== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9674== don't want to do, unless you know exactly what you're doing,
==9674== or are doing some strange experiment):
==9674==   /usr/lib/valgrind/../../bin/vgdb --pid=9674 ...command...
==9674== 
==9674== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9674==   /path/to/gdb ./zsh
==9674== and then give GDB the following command
==9674==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9674
==9674== --pid is optional if only one valgrind process is running
==9674== 
--9677-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9677== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9677-by-pythonnut-on-???
==9677== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9677-by-pythonnut-on-???
==9677== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9677-by-pythonnut-on-???
==9677== 
==9677== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9677== don't want to do, unless you know exactly what you're doing,
==9677== or are doing some strange experiment):
==9677==   /usr/lib/valgrind/../../bin/vgdb --pid=9677 ...command...
==9677== 
==9677== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9677==   /path/to/gdb ./zsh
==9677== and then give GDB the following command
==9677==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9677
==9677== --pid is optional if only one valgrind process is running
==9677== 
==9673== Checked 4,852,152 bytes
==9673== 
--9677-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9677== 
==9677== HEAP SUMMARY:
==9677==     in use at exit: 3,121,279 bytes in 69,145 blocks
==9677==   total heap usage: 1,464,046 allocs, 1,394,901 frees, 117,771,810 bytes allocated
==9677== 
==9673== LEAK SUMMARY:
==9673==    definitely lost: 2,181 bytes in 11 blocks
==9673==    indirectly lost: 6,756 bytes in 7 blocks
==9673==      possibly lost: 0 bytes in 0 blocks
==9673==    still reachable: 3,143,320 bytes in 69,305 blocks
==9673==         suppressed: 0 bytes in 0 blocks
==9673== Rerun with --leak-check=full to see details of leaked memory
==9673== 
==9673== Use --track-origins=yes to see where uninitialised values come from
==9673== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9673== 
==9673== 1 errors in context 1 of 2:
==9673== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9673==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9673==    by 0x488CD0: stringsubst (subst.c:301)
==9673==    by 0x48801B: prefork (subst.c:77)
==9673==    by 0x42B318: execcmd (exec.c:2619)
==9673==    by 0x428CA0: execpline2 (exec.c:1697)
==9673==    by 0x427FD2: execpline (exec.c:1484)
==9673==    by 0x427756: execlist (exec.c:1267)
==9673==    by 0x42717C: execode (exec.c:1073)
==9673==    by 0x431299: runshfunc (exec.c:5040)
==9673==    by 0x430E76: doshfunc (exec.c:4920)
==9673==    by 0x4302FB: execshfunc (exec.c:4557)
==9673==    by 0x42D8C1: execcmd (exec.c:3373)
==9673== 
==9673== 
==9673== 2 errors in context 2 of 2:
==9673== Conditional jump or move depends on uninitialised value(s)
==9673==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9673==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9673==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9673==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9673==    by 0x42D8E9: execcmd (exec.c:3378)
==9673==    by 0x428CA0: execpline2 (exec.c:1697)
==9673==    by 0x427FD2: execpline (exec.c:1484)
==9673==    by 0x42779A: execlist (exec.c:1275)
==9673==    by 0x42717C: execode (exec.c:1073)
==9673==    by 0x431299: runshfunc (exec.c:5040)
==9673==    by 0x430E76: doshfunc (exec.c:4920)
==9673==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9673== 
==9673== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFECF3C,  len 4
==9677== Searching for pointers to 69,145 not-freed blocks
--9677--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9677--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9677--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9677--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9677--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9677--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9677--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9677--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9677--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9677--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9677--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9677--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9677--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9677--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9677--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9677--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9677--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9677--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9677--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9677--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9677--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9677--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9677--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9677--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9677--   Scanning root segment: 0x701a000..0x701afff (4096)
--9677--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9677--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9677--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9677--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9677--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9677--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9677--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9677--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9677--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9680== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9680-by-pythonnut-on-???
==9680== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9680-by-pythonnut-on-???
==9680== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9680-by-pythonnut-on-???
==9680== 
==9680== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9680== don't want to do, unless you know exactly what you're doing,
==9680== or are doing some strange experiment):
==9680==   /usr/lib/valgrind/../../bin/vgdb --pid=9680 ...command...
==9680== 
==9680== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9680==   /path/to/gdb ./zsh
==9680== and then give GDB the following command
==9680==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9680
==9680== --pid is optional if only one valgrind process is running
==9680== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9681== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9681-by-pythonnut-on-???
==9681== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9681-by-pythonnut-on-???
==9681== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9681-by-pythonnut-on-???
==9681== 
==9681== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9681== don't want to do, unless you know exactly what you're doing,
==9681== or are doing some strange experiment):
==9681==   /usr/lib/valgrind/../../bin/vgdb --pid=9681 ...command...
==9681== 
==9681== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9681==   /path/to/gdb ./zsh
==9681== and then give GDB the following command
==9681==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9681
==9681== --pid is optional if only one valgrind process is running
==9681== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
--9681-- Caught __NR_exit; running __libc_freeres()
--9681-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9677== Checked 4,778,616 bytes
==9677== 
==9681== 
==9681== HEAP SUMMARY:
==9681==     in use at exit: 3,160,061 bytes in 69,547 blocks
==9681==   total heap usage: 1,468,165 allocs, 1,398,618 frees, 119,801,712 bytes allocated
==9681== 
==9677== LEAK SUMMARY:
==9677==    definitely lost: 2,181 bytes in 11 blocks
==9677==    indirectly lost: 6,756 bytes in 7 blocks
==9677==      possibly lost: 0 bytes in 0 blocks
==9677==    still reachable: 3,112,342 bytes in 69,127 blocks
==9677==         suppressed: 0 bytes in 0 blocks
==9677== Rerun with --leak-check=full to see details of leaked memory
==9677== 
==9677== Use --track-origins=yes to see where uninitialised values come from
==9677== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9677== 
==9677== 1 errors in context 1 of 2:
==9677== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9677==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9677==    by 0x488CD0: stringsubst (subst.c:301)
==9677==    by 0x48801B: prefork (subst.c:77)
==9677==    by 0x42B318: execcmd (exec.c:2619)
==9677==    by 0x428CA0: execpline2 (exec.c:1697)
==9677==    by 0x427FD2: execpline (exec.c:1484)
==9677==    by 0x427756: execlist (exec.c:1267)
==9677==    by 0x42717C: execode (exec.c:1073)
==9677==    by 0x431299: runshfunc (exec.c:5040)
==9677==    by 0x430E76: doshfunc (exec.c:4920)
==9677==    by 0x4302FB: execshfunc (exec.c:4557)
==9677==    by 0x42D8C1: execcmd (exec.c:3373)
==9677== 
==9677== 
==9677== 2 errors in context 2 of 2:
==9677== Conditional jump or move depends on uninitialised value(s)
==9677==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9677==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9677==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9677==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9677==    by 0x42D8E9: execcmd (exec.c:3378)
==9677==    by 0x428CA0: execpline2 (exec.c:1697)
==9677==    by 0x427FD2: execpline (exec.c:1484)
==9677==    by 0x42779A: execlist (exec.c:1275)
==9677==    by 0x42717C: execode (exec.c:1073)
==9677==    by 0x431299: runshfunc (exec.c:5040)
==9677==    by 0x430E76: doshfunc (exec.c:4920)
==9677==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9677== 
==9677== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9674-- Caught __NR_exit; running __libc_freeres()
==9681== Searching for pointers to 69,547 not-freed blocks
--9681--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9681--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9681--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9681--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9681--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9681--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9681--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9681--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9681--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9681--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9681--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9681--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9681--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9681--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9681--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9681--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9681--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9681--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9681--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9681--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9681--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9681--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9681--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9681--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9681--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9681--   Scanning root segment: 0x701a000..0x701afff (4096)
--9681--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9681--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9681--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9681--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9681--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9681--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9681--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9681--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9681--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9674-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9674== 
==9674== HEAP SUMMARY:
==9674==     in use at exit: 3,121,215 bytes in 69,142 blocks
==9674==   total heap usage: 1,464,044 allocs, 1,394,902 frees, 117,771,569 bytes allocated
==9674== 
==9674== Searching for pointers to 69,142 not-freed blocks
--9674--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9674--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9674--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9674--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9674--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9674--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9674--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9674--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9674--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9674--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9674--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9674--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9674--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9674--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9674--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9674--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9674--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9674--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9674--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9674--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9674--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9674--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9674--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9674--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9674--   Scanning root segment: 0x701a000..0x701afff (4096)
--9674--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9674--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9674--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9674--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9674--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9674--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9674--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9674--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9674--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9681== Checked 4,877,224 bytes
==9681== 
==9681== LEAK SUMMARY:
==9681==    definitely lost: 2,181 bytes in 11 blocks
==9681==    indirectly lost: 6,756 bytes in 7 blocks
==9681==      possibly lost: 0 bytes in 0 blocks
==9681==    still reachable: 3,151,124 bytes in 69,529 blocks
==9681==         suppressed: 0 bytes in 0 blocks
==9681== Rerun with --leak-check=full to see details of leaked memory
==9681== 
==9681== Use --track-origins=yes to see where uninitialised values come from
==9681== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9681== 
==9681== 1 errors in context 1 of 2:
==9681== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9681==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9681==    by 0x488CD0: stringsubst (subst.c:301)
==9681==    by 0x48801B: prefork (subst.c:77)
==9681==    by 0x42B318: execcmd (exec.c:2619)
==9681==    by 0x428CA0: execpline2 (exec.c:1697)
==9681==    by 0x427FD2: execpline (exec.c:1484)
==9681==    by 0x427756: execlist (exec.c:1267)
==9681==    by 0x42717C: execode (exec.c:1073)
==9681==    by 0x431299: runshfunc (exec.c:5040)
==9681==    by 0x430E76: doshfunc (exec.c:4920)
==9681==    by 0x4302FB: execshfunc (exec.c:4557)
==9681==    by 0x42D8C1: execcmd (exec.c:3373)
==9681== 
==9681== 
==9681== 2 errors in context 2 of 2:
==9681== Conditional jump or move depends on uninitialised value(s)
==9681==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9681==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9681==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9681==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9681==    by 0x42D8E9: execcmd (exec.c:3378)
==9681==    by 0x428CA0: execpline2 (exec.c:1697)
==9681==    by 0x427FD2: execpline (exec.c:1484)
==9681==    by 0x42779A: execlist (exec.c:1275)
==9681==    by 0x42717C: execode (exec.c:1073)
==9681==    by 0x431299: runshfunc (exec.c:5040)
==9681==    by 0x430E76: doshfunc (exec.c:4920)
==9681==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9681== 
==9681== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9680-- Caught __NR_exit; running __libc_freeres()
==9674== Checked 4,777,928 bytes
==9674== 
--9680-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9680== 
==9680== HEAP SUMMARY:
==9680==     in use at exit: 3,157,709 bytes in 69,467 blocks
==9680==   total heap usage: 1,468,071 allocs, 1,398,604 frees, 119,602,517 bytes allocated
==9680== 
==9674== LEAK SUMMARY:
==9674==    definitely lost: 2,181 bytes in 11 blocks
==9674==    indirectly lost: 6,756 bytes in 7 blocks
==9674==      possibly lost: 0 bytes in 0 blocks
==9674==    still reachable: 3,112,278 bytes in 69,124 blocks
==9674==         suppressed: 0 bytes in 0 blocks
==9674== Rerun with --leak-check=full to see details of leaked memory
==9674== 
==9674== Use --track-origins=yes to see where uninitialised values come from
==9674== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9674== 
==9674== 1 errors in context 1 of 2:
==9674== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9674==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9674==    by 0x488CD0: stringsubst (subst.c:301)
==9674==    by 0x48801B: prefork (subst.c:77)
==9674==    by 0x42B318: execcmd (exec.c:2619)
==9674==    by 0x428CA0: execpline2 (exec.c:1697)
==9674==    by 0x427FD2: execpline (exec.c:1484)
==9674==    by 0x427756: execlist (exec.c:1267)
==9674==    by 0x42717C: execode (exec.c:1073)
==9674==    by 0x431299: runshfunc (exec.c:5040)
==9674==    by 0x430E76: doshfunc (exec.c:4920)
==9674==    by 0x4302FB: execshfunc (exec.c:4557)
==9674==    by 0x42D8C1: execcmd (exec.c:3373)
==9674== 
==9674== 
==9674== 2 errors in context 2 of 2:
==9674== Conditional jump or move depends on uninitialised value(s)
==9674==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9674==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9674==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9674==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9674==    by 0x42D8E9: execcmd (exec.c:3378)
==9674==    by 0x428CA0: execpline2 (exec.c:1697)
==9674==    by 0x427FD2: execpline (exec.c:1484)
==9674==    by 0x42779A: execlist (exec.c:1275)
==9674==    by 0x42717C: execode (exec.c:1073)
==9674==    by 0x431299: runshfunc (exec.c:5040)
==9674==    by 0x430E76: doshfunc (exec.c:4920)
==9674==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9674== 
==9674== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9680== Searching for pointers to 69,467 not-freed blocks
--9680--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9680--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9680--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9680--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9680--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9680--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9680--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9680--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9680--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9680--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9680--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9680--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9680--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9680--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9680--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9680--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9680--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9680--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9680--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9680--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9680--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9680--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9680--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9680--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9680--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9680--   Scanning root segment: 0x701a000..0x701afff (4096)
--9680--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9680--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9680--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9680--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9680--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9680--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9680--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9680--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9680--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9682-- Caught __NR_exit; running __libc_freeres()
==9682== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9682-by-pythonnut-on-???
==9682== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9682-by-pythonnut-on-???
==9682== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9682-by-pythonnut-on-???
==9682== 
==9682== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9682== don't want to do, unless you know exactly what you're doing,
==9682== or are doing some strange experiment):
==9682==   /usr/lib/valgrind/../../bin/vgdb --pid=9682 ...command...
==9682== 
==9682== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9682==   /path/to/gdb ./zsh
==9682== and then give GDB the following command
==9682==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9682
==9682== --pid is optional if only one valgrind process is running
==9682== 
--9682-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9682== 
==9682== HEAP SUMMARY:
==9682==     in use at exit: 3,121,222 bytes in 69,142 blocks
==9682==   total heap usage: 1,464,059 allocs, 1,394,917 frees, 117,776,567 bytes allocated
==9682== 
==9682== Searching for pointers to 69,142 not-freed blocks
--9682--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9682--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9682--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9682--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9682--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9682--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9682--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9682--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9682--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9682--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9682--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9682--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9682--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9682--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9682--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9682--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9682--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9682--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9682--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9682--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9682--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9682--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9682--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9682--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9682--   Scanning root segment: 0x701a000..0x701afff (4096)
--9682--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9682--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9682--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9682--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9682--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9682--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9682--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9682--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9682--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9680== Checked 4,856,792 bytes
==9680== 
==9680== LEAK SUMMARY:
==9680==    definitely lost: 2,181 bytes in 11 blocks
==9680==    indirectly lost: 6,756 bytes in 7 blocks
==9680==      possibly lost: 0 bytes in 0 blocks
==9680==    still reachable: 3,148,772 bytes in 69,449 blocks
==9680==         suppressed: 0 bytes in 0 blocks
==9680== Rerun with --leak-check=full to see details of leaked memory
==9680== 
==9680== Use --track-origins=yes to see where uninitialised values come from
==9680== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9680== 
==9680== 1 errors in context 1 of 2:
==9680== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9680==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9680==    by 0x488CD0: stringsubst (subst.c:301)
==9680==    by 0x48801B: prefork (subst.c:77)
==9680==    by 0x42B318: execcmd (exec.c:2619)
==9680==    by 0x428CA0: execpline2 (exec.c:1697)
==9680==    by 0x427FD2: execpline (exec.c:1484)
==9680==    by 0x427756: execlist (exec.c:1267)
==9680==    by 0x42717C: execode (exec.c:1073)
==9680==    by 0x431299: runshfunc (exec.c:5040)
==9680==    by 0x430E76: doshfunc (exec.c:4920)
==9680==    by 0x4302FB: execshfunc (exec.c:4557)
==9680==    by 0x42D8C1: execcmd (exec.c:3373)
==9680== 
==9680== 
==9680== 2 errors in context 2 of 2:
==9680== Conditional jump or move depends on uninitialised value(s)
==9680==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9680==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9680==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9680==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9680==    by 0x42D8E9: execcmd (exec.c:3378)
==9680==    by 0x428CA0: execpline2 (exec.c:1697)
==9680==    by 0x427FD2: execpline (exec.c:1484)
==9680==    by 0x42779A: execlist (exec.c:1275)
==9680==    by 0x42717C: execode (exec.c:1073)
==9680==    by 0x431299: runshfunc (exec.c:5040)
==9680==    by 0x430E76: doshfunc (exec.c:4920)
==9680==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9680== 
==9680== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
==9683== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9683-by-pythonnut-on-???
==9683== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9683-by-pythonnut-on-???
==9683== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9683-by-pythonnut-on-???
==9683== 
==9683== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9683== don't want to do, unless you know exactly what you're doing,
==9683== or are doing some strange experiment):
==9683==   /usr/lib/valgrind/../../bin/vgdb --pid=9683 ...command...
==9683== 
==9683== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9683==   /path/to/gdb ./zsh
==9683== and then give GDB the following command
==9683==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9683
==9683== --pid is optional if only one valgrind process is running
==9683== 
==9684== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9684-by-pythonnut-on-???
==9684== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9684-by-pythonnut-on-???
==9684== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9684-by-pythonnut-on-???
==9684== 
==9684== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9684== don't want to do, unless you know exactly what you're doing,
==9684== or are doing some strange experiment):
==9684==   /usr/lib/valgrind/../../bin/vgdb --pid=9684 ...command...
==9684== 
==9684== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9684==   /path/to/gdb ./zsh
==9684== and then give GDB the following command
==9684==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9684
==9684== --pid is optional if only one valgrind process is running
==9684== 
==9682== Checked 4,778,072 bytes
==9682== 
--9684-- Caught __NR_exit; running __libc_freeres()
==9682== LEAK SUMMARY:
==9682==    definitely lost: 2,181 bytes in 11 blocks
==9682==    indirectly lost: 6,756 bytes in 7 blocks
==9682==      possibly lost: 0 bytes in 0 blocks
==9682==    still reachable: 3,112,285 bytes in 69,124 blocks
==9682==         suppressed: 0 bytes in 0 blocks
==9682== Rerun with --leak-check=full to see details of leaked memory
==9682== 
==9682== Use --track-origins=yes to see where uninitialised values come from
==9682== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9682== 
==9682== 1 errors in context 1 of 2:
==9682== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9682==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9682==    by 0x488CD0: stringsubst (subst.c:301)
==9682==    by 0x48801B: prefork (subst.c:77)
==9682==    by 0x42B318: execcmd (exec.c:2619)
==9682==    by 0x428CA0: execpline2 (exec.c:1697)
==9682==    by 0x427FD2: execpline (exec.c:1484)
==9682==    by 0x427756: execlist (exec.c:1267)
==9682==    by 0x42717C: execode (exec.c:1073)
==9682==    by 0x431299: runshfunc (exec.c:5040)
==9682==    by 0x430E76: doshfunc (exec.c:4920)
==9682==    by 0x4302FB: execshfunc (exec.c:4557)
==9682==    by 0x42D8C1: execcmd (exec.c:3373)
==9682== 
==9682== 
==9682== 2 errors in context 2 of 2:
==9682== Conditional jump or move depends on uninitialised value(s)
==9682==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9682==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9682==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9682==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9682==    by 0x42D8E9: execcmd (exec.c:3378)
==9682==    by 0x428CA0: execpline2 (exec.c:1697)
==9682==    by 0x427FD2: execpline (exec.c:1484)
==9682==    by 0x42779A: execlist (exec.c:1275)
==9682==    by 0x42717C: execode (exec.c:1073)
==9682==    by 0x431299: runshfunc (exec.c:5040)
==9682==    by 0x430E76: doshfunc (exec.c:4920)
==9682==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9682== 
==9682== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9684-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9684== 
==9684== HEAP SUMMARY:
==9684==     in use at exit: 3,166,244 bytes in 69,636 blocks
==9684==   total heap usage: 1,468,385 allocs, 1,398,749 frees, 119,863,331 bytes allocated
==9684== 
--9685-- Caught __NR_exit; running __libc_freeres()
==9685== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9685-by-pythonnut-on-???
==9685== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9685-by-pythonnut-on-???
==9685== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9685-by-pythonnut-on-???
==9685== 
==9685== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9685== don't want to do, unless you know exactly what you're doing,
==9685== or are doing some strange experiment):
==9685==   /usr/lib/valgrind/../../bin/vgdb --pid=9685 ...command...
==9685== 
==9685== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9685==   /path/to/gdb ./zsh
==9685== and then give GDB the following command
==9685==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9685
==9685== --pid is optional if only one valgrind process is running
==9685== 
==9684== Searching for pointers to 69,636 not-freed blocks
--9684--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9684--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9684--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9684--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9684--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9684--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9684--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9684--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9684--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9684--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9684--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9684--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9684--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9684--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9684--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9684--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9684--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9684--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9684--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9684--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9684--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9684--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9684--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9684--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9684--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9684--   Scanning root segment: 0x701a000..0x701afff (4096)
--9684--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9684--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9684--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9684--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9684--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9684--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9684--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9684--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9684--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9685-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9685== 
==9685== HEAP SUMMARY:
==9685==     in use at exit: 3,121,318 bytes in 69,142 blocks
==9685==   total heap usage: 1,464,075 allocs, 1,394,933 frees, 117,781,354 bytes allocated
==9685== 
==9685== Searching for pointers to 69,142 not-freed blocks
--9685--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9685--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9685--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9685--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9685--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9685--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9685--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9685--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9685--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9685--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9685--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9685--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9685--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9685--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9685--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9685--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9685--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9685--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9685--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9685--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9685--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9685--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9685--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9685--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9685--   Scanning root segment: 0x701a000..0x701afff (4096)
--9685--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9685--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9685--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9685--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9685--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9685--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9685--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9685--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9685--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9684== Checked 4,884,504 bytes
==9684== 
==9684== LEAK SUMMARY:
==9684==    definitely lost: 2,181 bytes in 11 blocks
==9684==    indirectly lost: 6,756 bytes in 7 blocks
==9684==      possibly lost: 0 bytes in 0 blocks
==9684==    still reachable: 3,157,307 bytes in 69,618 blocks
==9684==         suppressed: 0 bytes in 0 blocks
==9684== Rerun with --leak-check=full to see details of leaked memory
==9684== 
==9684== Use --track-origins=yes to see where uninitialised values come from
==9684== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9684== 
==9684== 1 errors in context 1 of 2:
==9684== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9684==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9684==    by 0x488CD0: stringsubst (subst.c:301)
==9684==    by 0x48801B: prefork (subst.c:77)
==9684==    by 0x42B318: execcmd (exec.c:2619)
==9684==    by 0x428CA0: execpline2 (exec.c:1697)
==9684==    by 0x427FD2: execpline (exec.c:1484)
==9684==    by 0x427756: execlist (exec.c:1267)
==9684==    by 0x42717C: execode (exec.c:1073)
==9684==    by 0x431299: runshfunc (exec.c:5040)
==9684==    by 0x430E76: doshfunc (exec.c:4920)
==9684==    by 0x4302FB: execshfunc (exec.c:4557)
==9684==    by 0x42D8C1: execcmd (exec.c:3373)
==9684== 
==9684== 
==9684== 2 errors in context 2 of 2:
==9684== Conditional jump or move depends on uninitialised value(s)
==9684==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9684==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9684==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9684==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9684==    by 0x42D8E9: execcmd (exec.c:3378)
==9684==    by 0x428CA0: execpline2 (exec.c:1697)
==9684==    by 0x427FD2: execpline (exec.c:1484)
==9684==    by 0x42779A: execlist (exec.c:1275)
==9684==    by 0x42717C: execode (exec.c:1073)
==9684==    by 0x431299: runshfunc (exec.c:5040)
==9684==    by 0x430E76: doshfunc (exec.c:4920)
==9684==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9684== 
==9684== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9683-- Caught __NR_exit; running __libc_freeres()
==9685== Checked 4,777,352 bytes
==9685== 
==9685== LEAK SUMMARY:
==9685==    definitely lost: 2,181 bytes in 11 blocks
==9685==    indirectly lost: 6,756 bytes in 7 blocks
==9685==      possibly lost: 0 bytes in 0 blocks
==9685==    still reachable: 3,112,381 bytes in 69,124 blocks
==9685==         suppressed: 0 bytes in 0 blocks
==9685== Rerun with --leak-check=full to see details of leaked memory
==9685== 
==9685== Use --track-origins=yes to see where uninitialised values come from
==9685== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9685== 
==9685== 1 errors in context 1 of 2:
==9685== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9685==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9685==    by 0x488CD0: stringsubst (subst.c:301)
==9685==    by 0x48801B: prefork (subst.c:77)
==9685==    by 0x42B318: execcmd (exec.c:2619)
==9685==    by 0x428CA0: execpline2 (exec.c:1697)
==9685==    by 0x427FD2: execpline (exec.c:1484)
==9685==    by 0x427756: execlist (exec.c:1267)
==9685==    by 0x42717C: execode (exec.c:1073)
==9685==    by 0x431299: runshfunc (exec.c:5040)
==9685==    by 0x430E76: doshfunc (exec.c:4920)
==9685==    by 0x4302FB: execshfunc (exec.c:4557)
==9685==    by 0x42D8C1: execcmd (exec.c:3373)
==9685== 
==9685== 
==9685== 2 errors in context 2 of 2:
==9685== Conditional jump or move depends on uninitialised value(s)
==9685==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9685==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9685==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9685==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9685==    by 0x42D8E9: execcmd (exec.c:3378)
==9685==    by 0x428CA0: execpline2 (exec.c:1697)
==9685==    by 0x427FD2: execpline (exec.c:1484)
==9685==    by 0x42779A: execlist (exec.c:1275)
==9685==    by 0x42717C: execode (exec.c:1073)
==9685==    by 0x431299: runshfunc (exec.c:5040)
==9685==    by 0x430E76: doshfunc (exec.c:4920)
==9685==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9685== 
==9685== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9683-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9683== 
==9683== HEAP SUMMARY:
==9683==     in use at exit: 3,163,869 bytes in 69,555 blocks
==9683==   total heap usage: 1,468,325 allocs, 1,398,770 frees, 119,633,433 bytes allocated
==9683== 
==9686== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9686-by-pythonnut-on-???
==9686== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9686-by-pythonnut-on-???
==9686== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9686-by-pythonnut-on-???
==9686== 
==9686== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9686== don't want to do, unless you know exactly what you're doing,
==9686== or are doing some strange experiment):
==9686==   /usr/lib/valgrind/../../bin/vgdb --pid=9686 ...command...
==9686== 
==9686== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9686==   /path/to/gdb ./zsh
==9686== and then give GDB the following command
==9686==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9686
==9686== --pid is optional if only one valgrind process is running
==9686== 
--9686-- Caught __NR_exit; running __libc_freeres()
==9683== Searching for pointers to 69,555 not-freed blocks
--9683--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9683--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9683--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9683--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9683--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9683--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9683--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9683--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9683--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9683--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9683--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9683--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9683--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9683--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9683--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9683--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9683--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9683--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9683--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9683--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9683--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9683--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9683--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9683--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9683--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9683--   Scanning root segment: 0x701a000..0x701afff (4096)
--9683--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9683--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9683--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9683--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9683--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9683--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9683--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9683--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9683--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9686-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9686== 
==9686== HEAP SUMMARY:
==9686==     in use at exit: 3,121,560 bytes in 69,148 blocks
==9686==   total heap usage: 1,464,123 allocs, 1,394,975 frees, 117,790,370 bytes allocated
==9686== 
==9686== Searching for pointers to 69,148 not-freed blocks
--9686--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9686--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9686--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9686--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9686--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9686--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9686--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9686--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9686--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9686--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9686--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9686--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9686--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9686--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9686--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9686--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9686--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9686--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9686--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9686--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9686--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9686--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9686--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9686--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9686--   Scanning root segment: 0x701a000..0x701afff (4096)
--9686--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9686--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9686--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9686--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9686--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9686--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9686--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9686--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9686--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9683== Checked 4,880,568 bytes
==9683== 
==9683== LEAK SUMMARY:
==9683==    definitely lost: 2,181 bytes in 11 blocks
==9683==    indirectly lost: 6,756 bytes in 7 blocks
==9683==      possibly lost: 0 bytes in 0 blocks
==9683==    still reachable: 3,154,932 bytes in 69,537 blocks
==9683==         suppressed: 0 bytes in 0 blocks
==9683== Rerun with --leak-check=full to see details of leaked memory
==9683== 
==9683== Use --track-origins=yes to see where uninitialised values come from
==9683== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9683== 
==9683== 1 errors in context 1 of 2:
==9683== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9683==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9683==    by 0x488CD0: stringsubst (subst.c:301)
==9683==    by 0x48801B: prefork (subst.c:77)
==9683==    by 0x42B318: execcmd (exec.c:2619)
==9683==    by 0x428CA0: execpline2 (exec.c:1697)
==9683==    by 0x427FD2: execpline (exec.c:1484)
==9683==    by 0x427756: execlist (exec.c:1267)
==9683==    by 0x42717C: execode (exec.c:1073)
==9683==    by 0x431299: runshfunc (exec.c:5040)
==9683==    by 0x430E76: doshfunc (exec.c:4920)
==9683==    by 0x4302FB: execshfunc (exec.c:4557)
==9683==    by 0x42D8C1: execcmd (exec.c:3373)
==9683== 
==9683== 
==9683== 2 errors in context 2 of 2:
==9683== Conditional jump or move depends on uninitialised value(s)
==9683==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9683==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9683==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9683==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9683==    by 0x42D8E9: execcmd (exec.c:3378)
==9683==    by 0x428CA0: execpline2 (exec.c:1697)
==9683==    by 0x427FD2: execpline (exec.c:1484)
==9683==    by 0x42779A: execlist (exec.c:1275)
==9683==    by 0x42717C: execode (exec.c:1073)
==9683==    by 0x431299: runshfunc (exec.c:5040)
==9683==    by 0x430E76: doshfunc (exec.c:4920)
==9683==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9683== 
==9683== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
==9686== Checked 4,777,496 bytes
==9686== 
client request: code 4d430005,  addr 0xFFEFF3DBC,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
==9686== LEAK SUMMARY:
==9686==    definitely lost: 2,181 bytes in 11 blocks
==9686==    indirectly lost: 6,756 bytes in 7 blocks
==9686==      possibly lost: 0 bytes in 0 blocks
==9686==    still reachable: 3,112,623 bytes in 69,130 blocks
==9686==         suppressed: 0 bytes in 0 blocks
==9686== Rerun with --leak-check=full to see details of leaked memory
==9686== 
==9686== Use --track-origins=yes to see where uninitialised values come from
==9686== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9686== 
==9686== 1 errors in context 1 of 2:
==9686== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9686==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9686==    by 0x488CD0: stringsubst (subst.c:301)
==9686==    by 0x48801B: prefork (subst.c:77)
==9686==    by 0x42B318: execcmd (exec.c:2619)
==9686==    by 0x428CA0: execpline2 (exec.c:1697)
==9686==    by 0x427FD2: execpline (exec.c:1484)
==9686==    by 0x427756: execlist (exec.c:1267)
==9686==    by 0x42717C: execode (exec.c:1073)
==9686==    by 0x431299: runshfunc (exec.c:5040)
==9686==    by 0x430E76: doshfunc (exec.c:4920)
==9686==    by 0x4302FB: execshfunc (exec.c:4557)
==9686==    by 0x42D8C1: execcmd (exec.c:3373)
==9686== 
==9686== 
==9686== 2 errors in context 2 of 2:
==9686== Conditional jump or move depends on uninitialised value(s)
==9686==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9686==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9686==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9686==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9686==    by 0x42D8E9: execcmd (exec.c:3378)
==9686==    by 0x428CA0: execpline2 (exec.c:1697)
==9686==    by 0x427FD2: execpline (exec.c:1484)
==9686==    by 0x42779A: execlist (exec.c:1275)
==9686==    by 0x42717C: execode (exec.c:1073)
==9686==    by 0x431299: runshfunc (exec.c:5040)
==9686==    by 0x430E76: doshfunc (exec.c:4920)
==9686==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9686== 
==9686== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE992C,  len 4
--9688-- Caught __NR_exit; running __libc_freeres()
==9688== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9688-by-pythonnut-on-???
==9688== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9688-by-pythonnut-on-???
==9688== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9688-by-pythonnut-on-???
==9688== 
==9688== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9688== don't want to do, unless you know exactly what you're doing,
==9688== or are doing some strange experiment):
==9688==   /usr/lib/valgrind/../../bin/vgdb --pid=9688 ...command...
==9688== 
==9688== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9688==   /path/to/gdb ./zsh
==9688== and then give GDB the following command
==9688==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9688
==9688== --pid is optional if only one valgrind process is running
==9688== 
==9690== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9690-by-pythonnut-on-???
==9690== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9690-by-pythonnut-on-???
==9690== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9690-by-pythonnut-on-???
==9690== 
==9690== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9690== don't want to do, unless you know exactly what you're doing,
==9690== or are doing some strange experiment):
==9690==   /usr/lib/valgrind/../../bin/vgdb --pid=9690 ...command...
==9690== 
==9690== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9690==   /path/to/gdb ./zsh
==9690== and then give GDB the following command
==9690==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9690
==9690== --pid is optional if only one valgrind process is running
==9690== 
client request: code 4d430005,  addr 0xFFEFE87EC,  len 4
--9688-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9688== 
==9688== HEAP SUMMARY:
==9688==     in use at exit: 3,121,496 bytes in 69,148 blocks
==9688==   total heap usage: 1,464,103 allocs, 1,394,955 frees, 117,788,140 bytes allocated
==9688== 
==9689== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9689-by-pythonnut-on-???
==9689== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9689-by-pythonnut-on-???
==9689== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9689-by-pythonnut-on-???
==9689== 
==9689== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9689== don't want to do, unless you know exactly what you're doing,
==9689== or are doing some strange experiment):
==9689==   /usr/lib/valgrind/../../bin/vgdb --pid=9689 ...command...
==9689== 
==9689== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9689==   /path/to/gdb ./zsh
==9689== and then give GDB the following command
==9689==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9689
==9689== --pid is optional if only one valgrind process is running
==9689== 
--9689-- Caught __NR_exit; running __libc_freeres()
==9688== Searching for pointers to 69,148 not-freed blocks
--9688--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9688--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9689-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9688--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9688--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9688--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9688--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9688--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9688--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9688--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9688--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9688--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9688--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9688--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9688--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9688--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9688--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9688--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9688--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9688--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9688--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9688--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9688--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9688--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9688--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9688--   Scanning root segment: 0x701a000..0x701afff (4096)
--9688--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9688--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9688--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9688--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9688--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9688--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9688--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9688--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9688--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9689== 
==9689== HEAP SUMMARY:
==9689==     in use at exit: 3,172,620 bytes in 69,644 blocks
==9689==   total heap usage: 1,468,650 allocs, 1,399,006 frees, 119,679,406 bytes allocated
==9689== 
==9689== Searching for pointers to 69,644 not-freed blocks
--9689--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9689--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9689--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9689--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9689--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9689--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9689--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9689--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9689--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9689--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9689--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9689--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9689--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9689--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9689--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9689--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9689--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9689--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9689--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9689--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9689--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9689--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9689--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9689--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9689--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9689--   Scanning root segment: 0x701a000..0x701afff (4096)
--9689--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9689--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9689--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9689--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9689--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9689--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9689--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9689--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9689--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9688== Checked 4,777,448 bytes
==9688== 
==9688== LEAK SUMMARY:
==9688==    definitely lost: 2,181 bytes in 11 blocks
==9688==    indirectly lost: 6,756 bytes in 7 blocks
==9688==      possibly lost: 0 bytes in 0 blocks
==9688==    still reachable: 3,112,559 bytes in 69,130 blocks
==9688==         suppressed: 0 bytes in 0 blocks
==9688== Rerun with --leak-check=full to see details of leaked memory
==9688== 
==9688== Use --track-origins=yes to see where uninitialised values come from
==9688== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9688== 
==9688== 1 errors in context 1 of 2:
==9688== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9688==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9688==    by 0x488CD0: stringsubst (subst.c:301)
==9688==    by 0x48801B: prefork (subst.c:77)
==9688==    by 0x42B318: execcmd (exec.c:2619)
==9688==    by 0x428CA0: execpline2 (exec.c:1697)
==9688==    by 0x427FD2: execpline (exec.c:1484)
==9688==    by 0x427756: execlist (exec.c:1267)
==9688==    by 0x42717C: execode (exec.c:1073)
==9688==    by 0x431299: runshfunc (exec.c:5040)
==9688==    by 0x430E76: doshfunc (exec.c:4920)
==9688==    by 0x4302FB: execshfunc (exec.c:4557)
==9688==    by 0x42D8C1: execcmd (exec.c:3373)
==9688== 
==9688== 
==9688== 2 errors in context 2 of 2:
==9688== Conditional jump or move depends on uninitialised value(s)
==9688==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9688==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9688==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9688==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9688==    by 0x42D8E9: execcmd (exec.c:3378)
==9688==    by 0x428CA0: execpline2 (exec.c:1697)
==9688==    by 0x427FD2: execpline (exec.c:1484)
==9688==    by 0x42779A: execlist (exec.c:1275)
==9688==    by 0x42717C: execode (exec.c:1073)
==9688==    by 0x431299: runshfunc (exec.c:5040)
==9688==    by 0x430E76: doshfunc (exec.c:4920)
==9688==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9688== 
==9688== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9689== Checked 4,893,648 bytes
==9689== 
==9693== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9693-by-pythonnut-on-???
==9693== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9693-by-pythonnut-on-???
==9693== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9693-by-pythonnut-on-???
==9693== 
==9693== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9693== don't want to do, unless you know exactly what you're doing,
==9693== or are doing some strange experiment):
==9693==   /usr/lib/valgrind/../../bin/vgdb --pid=9693 ...command...
==9693== 
==9693== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9693==   /path/to/gdb ./zsh
==9693== and then give GDB the following command
==9693==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9693
==9693== --pid is optional if only one valgrind process is running
==9693== 
==9689== LEAK SUMMARY:
==9689==    definitely lost: 2,181 bytes in 11 blocks
==9689==    indirectly lost: 6,756 bytes in 7 blocks
==9689==      possibly lost: 0 bytes in 0 blocks
==9689==    still reachable: 3,163,683 bytes in 69,626 blocks
==9689==         suppressed: 0 bytes in 0 blocks
==9689== Rerun with --leak-check=full to see details of leaked memory
==9689== 
==9689== Use --track-origins=yes to see where uninitialised values come from
==9689== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9689== 
==9689== 1 errors in context 1 of 2:
==9689== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9689==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9689==    by 0x488CD0: stringsubst (subst.c:301)
==9689==    by 0x48801B: prefork (subst.c:77)
==9689==    by 0x42B318: execcmd (exec.c:2619)
==9689==    by 0x428CA0: execpline2 (exec.c:1697)
==9689==    by 0x427FD2: execpline (exec.c:1484)
==9689==    by 0x427756: execlist (exec.c:1267)
==9689==    by 0x42717C: execode (exec.c:1073)
==9689==    by 0x431299: runshfunc (exec.c:5040)
==9689==    by 0x430E76: doshfunc (exec.c:4920)
==9689==    by 0x4302FB: execshfunc (exec.c:4557)
==9689==    by 0x42D8C1: execcmd (exec.c:3373)
==9689== 
==9689== 
==9689== 2 errors in context 2 of 2:
==9689== Conditional jump or move depends on uninitialised value(s)
==9689==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9689==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9689==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9689==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9689==    by 0x42D8E9: execcmd (exec.c:3378)
==9689==    by 0x428CA0: execpline2 (exec.c:1697)
==9689==    by 0x427FD2: execpline (exec.c:1484)
==9689==    by 0x42779A: execlist (exec.c:1275)
==9689==    by 0x42717C: execode (exec.c:1073)
==9689==    by 0x431299: runshfunc (exec.c:5040)
==9689==    by 0x430E76: doshfunc (exec.c:4920)
==9689==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9689== 
==9689== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9693-- Caught __NR_exit; running __libc_freeres()
--9695-- Caught __NR_exit; running __libc_freeres()
--9693-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFE7F8C,  len 4
==9695== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9695-by-pythonnut-on-???
==9695== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9695-by-pythonnut-on-???
==9695== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9695-by-pythonnut-on-???
==9695== 
==9695== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9695== don't want to do, unless you know exactly what you're doing,
==9695== or are doing some strange experiment):
==9695==   /usr/lib/valgrind/../../bin/vgdb --pid=9695 ...command...
==9695== 
==9695== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9695==   /path/to/gdb ./zsh
==9695== and then give GDB the following command
==9695==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9695
==9695== --pid is optional if only one valgrind process is running
==9695== 
==9693== 
==9693== HEAP SUMMARY:
==9693==     in use at exit: 3,121,534 bytes in 69,149 blocks
==9693==   total heap usage: 1,464,116 allocs, 1,394,967 frees, 117,790,837 bytes allocated
==9693== 
--9695-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9695== 
==9695== HEAP SUMMARY:
==9695==     in use at exit: 3,172,776 bytes in 69,650 blocks
==9695==   total heap usage: 1,468,659 allocs, 1,399,009 frees, 119,681,402 bytes allocated
==9695== 
==9693== Searching for pointers to 69,149 not-freed blocks
--9693--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9693--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9693--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9693--   Scanning root segment: 0x4037000..0x403afff (16384)
--9693--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9693--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9693--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9693--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9693--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9693--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9693--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9693--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9693--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9693--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9693--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9693--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9693--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9693--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9693--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9693--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9693--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9693--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9693--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9693--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9693--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9693--   Scanning root segment: 0x701a000..0x701afff (4096)
--9693--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9693--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9693--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9693--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9693--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9693--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9693--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9693--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9693--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9695== Searching for pointers to 69,650 not-freed blocks
--9695--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9695--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9695--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9695--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9695--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9695--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9695--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9695--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9695--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9695--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9695--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9695--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9695--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9695--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9695--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9695--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9695--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9695--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9695--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9695--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9695--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9695--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9695--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9695--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9695--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9695--   Scanning root segment: 0x701a000..0x701afff (4096)
--9695--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9695--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9695--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9695--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9695--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9695--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9695--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9695--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9695--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9693== Checked 4,793,352 bytes
==9693== 
==9693== LEAK SUMMARY:
==9693==    definitely lost: 2,181 bytes in 11 blocks
==9693==    indirectly lost: 6,756 bytes in 7 blocks
==9693==      possibly lost: 0 bytes in 0 blocks
==9693==    still reachable: 3,112,597 bytes in 69,131 blocks
==9693==         suppressed: 0 bytes in 0 blocks
==9693== Rerun with --leak-check=full to see details of leaked memory
==9693== 
==9693== Use --track-origins=yes to see where uninitialised values come from
==9693== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9693== 
==9693== 1 errors in context 1 of 2:
==9693== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9693==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9693==    by 0x488CD0: stringsubst (subst.c:301)
==9693==    by 0x48801B: prefork (subst.c:77)
==9693==    by 0x42B318: execcmd (exec.c:2619)
==9693==    by 0x428CA0: execpline2 (exec.c:1697)
==9693==    by 0x427FD2: execpline (exec.c:1484)
==9693==    by 0x427756: execlist (exec.c:1267)
==9693==    by 0x42717C: execode (exec.c:1073)
==9693==    by 0x431299: runshfunc (exec.c:5040)
==9693==    by 0x430E76: doshfunc (exec.c:4920)
==9693==    by 0x4302FB: execshfunc (exec.c:4557)
==9693==    by 0x42D8C1: execcmd (exec.c:3373)
==9693== 
==9693== 
==9693== 2 errors in context 2 of 2:
==9693== Conditional jump or move depends on uninitialised value(s)
==9693==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9693==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9693==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9693==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9693==    by 0x42D8E9: execcmd (exec.c:3378)
==9693==    by 0x428CA0: execpline2 (exec.c:1697)
==9693==    by 0x427FD2: execpline (exec.c:1484)
==9693==    by 0x42779A: execlist (exec.c:1275)
==9693==    by 0x42717C: execode (exec.c:1073)
==9693==    by 0x431299: runshfunc (exec.c:5040)
==9693==    by 0x430E76: doshfunc (exec.c:4920)
==9693==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9693== 
==9693== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9695== Checked 4,894,928 bytes
==9695== 
==9695== LEAK SUMMARY:
==9695==    definitely lost: 2,181 bytes in 11 blocks
==9695==    indirectly lost: 6,756 bytes in 7 blocks
==9695==      possibly lost: 0 bytes in 0 blocks
==9695==    still reachable: 3,163,839 bytes in 69,632 blocks
==9695==         suppressed: 0 bytes in 0 blocks
==9695== Rerun with --leak-check=full to see details of leaked memory
==9695== 
==9695== Use --track-origins=yes to see where uninitialised values come from
==9695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9695== 
==9695== 1 errors in context 1 of 2:
==9695== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9695==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9695==    by 0x488CD0: stringsubst (subst.c:301)
==9695==    by 0x48801B: prefork (subst.c:77)
==9695==    by 0x42B318: execcmd (exec.c:2619)
==9695==    by 0x428CA0: execpline2 (exec.c:1697)
==9695==    by 0x427FD2: execpline (exec.c:1484)
==9695==    by 0x427756: execlist (exec.c:1267)
==9695==    by 0x42717C: execode (exec.c:1073)
==9695==    by 0x431299: runshfunc (exec.c:5040)
==9695==    by 0x430E76: doshfunc (exec.c:4920)
==9695==    by 0x4302FB: execshfunc (exec.c:4557)
==9695==    by 0x42D8C1: execcmd (exec.c:3373)
==9695== 
==9695== 
==9695== 2 errors in context 2 of 2:
==9695== Conditional jump or move depends on uninitialised value(s)
==9695==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9695==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9695==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9695==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9695==    by 0x42D8E9: execcmd (exec.c:3378)
==9695==    by 0x428CA0: execpline2 (exec.c:1697)
==9695==    by 0x427FD2: execpline (exec.c:1484)
==9695==    by 0x42779A: execlist (exec.c:1275)
==9695==    by 0x42717C: execode (exec.c:1073)
==9695==    by 0x431299: runshfunc (exec.c:5040)
==9695==    by 0x430E76: doshfunc (exec.c:4920)
==9695==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9695== 
==9695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9694-- Caught __NR_exit; running __libc_freeres()
==9694== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9694-by-pythonnut-on-???
==9694== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9694-by-pythonnut-on-???
==9694== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9694-by-pythonnut-on-???
==9694== 
==9694== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9694== don't want to do, unless you know exactly what you're doing,
==9694== or are doing some strange experiment):
==9694==   /usr/lib/valgrind/../../bin/vgdb --pid=9694 ...command...
==9694== 
==9694== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9694==   /path/to/gdb ./zsh
==9694== and then give GDB the following command
==9694==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9694
==9694== --pid is optional if only one valgrind process is running
==9694== 
--9694-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9694== 
==9694== HEAP SUMMARY:
==9694==     in use at exit: 3,172,712 bytes in 69,647 blocks
==9694==   total heap usage: 1,468,661 allocs, 1,399,014 frees, 119,681,946 bytes allocated
==9694== 
==9694== Searching for pointers to 69,647 not-freed blocks
--9694--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9694--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9694--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9694--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9694--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9694--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9694--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9694--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9694--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9694--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9694--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9694--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9694--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9694--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9694--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9694--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9694--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9694--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9694--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9694--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9694--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9694--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9694--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9694--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9694--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9694--   Scanning root segment: 0x701a000..0x701afff (4096)
--9694--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9694--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9694--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9694--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9694--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9694--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9694--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9694--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9694--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/regex.so
--7806--    svma 0x0000000d70, avma 0x000bc84d70
==9694== Checked 4,894,240 bytes
==9694== 
==9694== LEAK SUMMARY:
==9694==    definitely lost: 2,181 bytes in 11 blocks
==9694==    indirectly lost: 6,756 bytes in 7 blocks
==9694==      possibly lost: 0 bytes in 0 blocks
==9694==    still reachable: 3,163,775 bytes in 69,629 blocks
==9694==         suppressed: 0 bytes in 0 blocks
==9694== Rerun with --leak-check=full to see details of leaked memory
==9694== 
==9694== Use --track-origins=yes to see where uninitialised values come from
==9694== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9694== 
==9694== 1 errors in context 1 of 2:
==9694== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9694==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9694==    by 0x488CD0: stringsubst (subst.c:301)
==9694==    by 0x48801B: prefork (subst.c:77)
==9694==    by 0x42B318: execcmd (exec.c:2619)
==9694==    by 0x428CA0: execpline2 (exec.c:1697)
==9694==    by 0x427FD2: execpline (exec.c:1484)
==9694==    by 0x427756: execlist (exec.c:1267)
==9694==    by 0x42717C: execode (exec.c:1073)
==9694==    by 0x431299: runshfunc (exec.c:5040)
==9694==    by 0x430E76: doshfunc (exec.c:4920)
==9694==    by 0x4302FB: execshfunc (exec.c:4557)
==9694==    by 0x42D8C1: execcmd (exec.c:3373)
==9694== 
==9694== 
==9694== 2 errors in context 2 of 2:
==9694== Conditional jump or move depends on uninitialised value(s)
==9694==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9694==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9694==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9694==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9694==    by 0x42D8E9: execcmd (exec.c:3378)
==9694==    by 0x428CA0: execpline2 (exec.c:1697)
==9694==    by 0x427FD2: execpline (exec.c:1484)
==9694==    by 0x42779A: execlist (exec.c:1275)
==9694==    by 0x42717C: execode (exec.c:1073)
==9694==    by 0x431299: runshfunc (exec.c:5040)
==9694==    by 0x430E76: doshfunc (exec.c:4920)
==9694==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9694== 
==9694== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9697-by-pythonnut-on-???
==9697== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9697-by-pythonnut-on-???
==9697== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9697-by-pythonnut-on-???
==9697== 
==9697== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9697== don't want to do, unless you know exactly what you're doing,
==9697== or are doing some strange experiment):
==9697==   /usr/lib/valgrind/../../bin/vgdb --pid=9697 ...command...
==9697== 
==9697== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9697==   /path/to/gdb ./zsh
==9697== and then give GDB the following command
==9697==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9697
==9697== --pid is optional if only one valgrind process is running
==9697== 
--9698-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE77CC,  len 4
==9698== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9698-by-pythonnut-on-???
==9698== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9698-by-pythonnut-on-???
==9698== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9698-by-pythonnut-on-???
==9698== 
==9698== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9698== don't want to do, unless you know exactly what you're doing,
==9698== or are doing some strange experiment):
==9698==   /usr/lib/valgrind/../../bin/vgdb --pid=9698 ...command...
==9698== 
==9698== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9698==   /path/to/gdb ./zsh
==9698== and then give GDB the following command
==9698==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9698
==9698== --pid is optional if only one valgrind process is running
==9698== 
--9698-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9698== 
==9698== HEAP SUMMARY:
==9698==     in use at exit: 3,172,873 bytes in 69,653 blocks
==9698==   total heap usage: 1,468,666 allocs, 1,399,013 frees, 119,683,611 bytes allocated
==9698== 
==9698== Searching for pointers to 69,653 not-freed blocks
--9698--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9698--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9698--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9698--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9698--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9698--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9698--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9698--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9698--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9698--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9698--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9698--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9698--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9698--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9698--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9698--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9698--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9698--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9698--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9698--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9698--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9698--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9698--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9698--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9698--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9698--   Scanning root segment: 0x701a000..0x701afff (4096)
--9698--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9698--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9698--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9698--   Scanning root segment: 0xb054000..0xb054fff (4096)
==9700== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9700-by-pythonnut-on-???
==9700== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9700-by-pythonnut-on-???
==9700== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9700-by-pythonnut-on-???
==9700== 
==9700== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9700== don't want to do, unless you know exactly what you're doing,
==9700== or are doing some strange experiment):
==9700==   /usr/lib/valgrind/../../bin/vgdb --pid=9700 ...command...
==9700== 
==9700== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9700==   /path/to/gdb ./zsh
==9700== and then give GDB the following command
==9700==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9700
==9700== --pid is optional if only one valgrind process is running
--9698--   Scanning root segment: 0xb268000..0xb268fff (4096)
==9700== 
--9698--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9698--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9698--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9698--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9700-- Caught __NR_exit; running __libc_freeres()
--9700-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9700== 
==9700== HEAP SUMMARY:
==9700==     in use at exit: 3,140,020 bytes in 69,570 blocks
==9700==   total heap usage: 1,465,843 allocs, 1,396,273 frees, 117,901,385 bytes allocated
==9700== 
==9700== Searching for pointers to 69,570 not-freed blocks
--9700--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9700--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9700--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9700--   Scanning root segment: 0x4037000..0x403afff (16384)
--9700--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9700--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9700--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9700--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9700--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9700--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9700--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9700--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9700--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9700--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9700--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9700--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9700--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9700--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9700--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9700--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9700--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9700--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9700--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9700--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9700--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9700--   Scanning root segment: 0x701a000..0x701afff (4096)
--9700--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9700--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9700--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9700--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9700--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9700--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9700--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9700--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9700--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9700--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9698== Checked 4,895,528 bytes
==9698== 
==9698== LEAK SUMMARY:
==9698==    definitely lost: 2,181 bytes in 11 blocks
==9698==    indirectly lost: 6,756 bytes in 7 blocks
==9698==      possibly lost: 0 bytes in 0 blocks
==9698==    still reachable: 3,163,936 bytes in 69,635 blocks
==9698==         suppressed: 0 bytes in 0 blocks
==9698== Rerun with --leak-check=full to see details of leaked memory
==9698== 
==9698== Use --track-origins=yes to see where uninitialised values come from
==9698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9698== 
==9698== 1 errors in context 1 of 2:
==9698== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9698==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9698==    by 0x488CD0: stringsubst (subst.c:301)
==9698==    by 0x48801B: prefork (subst.c:77)
==9698==    by 0x42B318: execcmd (exec.c:2619)
==9698==    by 0x428CA0: execpline2 (exec.c:1697)
==9698==    by 0x427FD2: execpline (exec.c:1484)
==9698==    by 0x427756: execlist (exec.c:1267)
==9698==    by 0x42717C: execode (exec.c:1073)
==9698==    by 0x431299: runshfunc (exec.c:5040)
==9698==    by 0x430E76: doshfunc (exec.c:4920)
==9698==    by 0x4302FB: execshfunc (exec.c:4557)
==9698==    by 0x42D8C1: execcmd (exec.c:3373)
==9698== 
==9698== 
==9698== 2 errors in context 2 of 2:
==9698== Conditional jump or move depends on uninitialised value(s)
==9698==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9698==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9698==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9698==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9698==    by 0x42D8E9: execcmd (exec.c:3378)
==9698==    by 0x428CA0: execpline2 (exec.c:1697)
==9698==    by 0x427FD2: execpline (exec.c:1484)
==9698==    by 0x42779A: execlist (exec.c:1275)
==9698==    by 0x42717C: execode (exec.c:1073)
==9698==    by 0x431299: runshfunc (exec.c:5040)
==9698==    by 0x430E76: doshfunc (exec.c:4920)
==9698==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9698== 
==9698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9697-- Caught __NR_exit; running __libc_freeres()
--9697-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9700== Checked 4,832,216 bytes
==9700== 
==9697== 
==9697== HEAP SUMMARY:
==9697==     in use at exit: 3,172,809 bytes in 69,650 blocks
==9697==   total heap usage: 1,468,668 allocs, 1,399,018 frees, 119,684,155 bytes allocated
==9697== 
==9700== LEAK SUMMARY:
==9700==    definitely lost: 2,181 bytes in 11 blocks
==9700==    indirectly lost: 6,756 bytes in 7 blocks
==9700==      possibly lost: 0 bytes in 0 blocks
==9700==    still reachable: 3,131,083 bytes in 69,552 blocks
==9700==         suppressed: 0 bytes in 0 blocks
==9700== Rerun with --leak-check=full to see details of leaked memory
==9700== 
==9700== Use --track-origins=yes to see where uninitialised values come from
==9700== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9700== 
==9700== 1 errors in context 1 of 2:
==9700== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9700==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9700==    by 0x488CD0: stringsubst (subst.c:301)
==9700==    by 0x48801B: prefork (subst.c:77)
==9700==    by 0x42B318: execcmd (exec.c:2619)
==9700==    by 0x428CA0: execpline2 (exec.c:1697)
==9700==    by 0x427FD2: execpline (exec.c:1484)
==9700==    by 0x427756: execlist (exec.c:1267)
==9700==    by 0x42717C: execode (exec.c:1073)
==9700==    by 0x431299: runshfunc (exec.c:5040)
==9700==    by 0x430E76: doshfunc (exec.c:4920)
==9700==    by 0x4302FB: execshfunc (exec.c:4557)
==9700==    by 0x42D8C1: execcmd (exec.c:3373)
==9700== 
==9700== 
==9700== 2 errors in context 2 of 2:
==9700== Conditional jump or move depends on uninitialised value(s)
==9700==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9700==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9700==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9700==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9700==    by 0x42D8E9: execcmd (exec.c:3378)
==9700==    by 0x428CA0: execpline2 (exec.c:1697)
==9700==    by 0x427FD2: execpline (exec.c:1484)
==9700==    by 0x42779A: execlist (exec.c:1275)
==9700==    by 0x42717C: execode (exec.c:1073)
==9700==    by 0x431299: runshfunc (exec.c:5040)
==9700==    by 0x430E76: doshfunc (exec.c:4920)
==9700==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9700== 
==9700== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== Searching for pointers to 69,650 not-freed blocks
--9697--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9697--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9697--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9697--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9697--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9697--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9697--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9697--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9697--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9697--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9697--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9697--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9697--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9697--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9697--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9697--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9697--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9697--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9697--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9697--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9697--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9697--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9697--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9697--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9697--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9697--   Scanning root segment: 0x701a000..0x701afff (4096)
--9697--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9697--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9697--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9697--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9697--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9697--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9697--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9697--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9697--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9697== Checked 4,894,848 bytes
==9697== 
==9697== LEAK SUMMARY:
==9697==    definitely lost: 2,181 bytes in 11 blocks
==9697==    indirectly lost: 6,756 bytes in 7 blocks
==9697==      possibly lost: 0 bytes in 0 blocks
==9697==    still reachable: 3,163,872 bytes in 69,632 blocks
==9697==         suppressed: 0 bytes in 0 blocks
==9697== Rerun with --leak-check=full to see details of leaked memory
==9697== 
==9697== Use --track-origins=yes to see where uninitialised values come from
==9697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== 
==9697== 1 errors in context 1 of 2:
==9697== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9697==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9697==    by 0x488CD0: stringsubst (subst.c:301)
==9697==    by 0x48801B: prefork (subst.c:77)
==9697==    by 0x42B318: execcmd (exec.c:2619)
==9697==    by 0x428CA0: execpline2 (exec.c:1697)
==9697==    by 0x427FD2: execpline (exec.c:1484)
==9697==    by 0x427756: execlist (exec.c:1267)
==9697==    by 0x42717C: execode (exec.c:1073)
==9697==    by 0x431299: runshfunc (exec.c:5040)
==9697==    by 0x430E76: doshfunc (exec.c:4920)
==9697==    by 0x4302FB: execshfunc (exec.c:4557)
==9697==    by 0x42D8C1: execcmd (exec.c:3373)
==9697== 
==9697== 
==9697== 2 errors in context 2 of 2:
==9697== Conditional jump or move depends on uninitialised value(s)
==9697==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9697==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9697==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9697==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9697==    by 0x42D8E9: execcmd (exec.c:3378)
==9697==    by 0x428CA0: execpline2 (exec.c:1697)
==9697==    by 0x427FD2: execpline (exec.c:1484)
==9697==    by 0x42779A: execlist (exec.c:1275)
==9697==    by 0x42717C: execode (exec.c:1073)
==9697==    by 0x431299: runshfunc (exec.c:5040)
==9697==    by 0x430E76: doshfunc (exec.c:4920)
==9697==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9697== 
==9697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF757C,  len 4
client request: code 4d430005,  addr 0xFFEFF642C,  len 4
client request: code 4d430005,  addr 0xFFEFF933C,  len 4
--9657-- Caught __NR_exit; running __libc_freeres()
--9657-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9657== 
==9657== HEAP SUMMARY:
==9657==     in use at exit: 3,151,130 bytes in 69,168 blocks
==9657==   total heap usage: 1,468,759 allocs, 1,399,591 frees, 119,700,926 bytes allocated
==9657== 
==9657== Searching for pointers to 69,168 not-freed blocks
--9657--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9657--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9657--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9657--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9657--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9657--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9657--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9657--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9657--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9657--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9657--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9657--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9657--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9657--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9657--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9657--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9657--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9657--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9657--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9657--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9657--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9657--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9657--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9657--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9657--   Scanning root segment: 0x701a000..0x701afff (4096)
--9657--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9657--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9657--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9657--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9657--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9657--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9657--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9657--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9657--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9657== Checked 4,796,992 bytes
==9657== 
==9657== LEAK SUMMARY:
==9657==    definitely lost: 2,181 bytes in 11 blocks
==9657==    indirectly lost: 6,756 bytes in 7 blocks
==9657==      possibly lost: 0 bytes in 0 blocks
==9657==    still reachable: 3,142,193 bytes in 69,150 blocks
==9657==         suppressed: 0 bytes in 0 blocks
==9657== Rerun with --leak-check=full to see details of leaked memory
==9657== 
==9657== Use --track-origins=yes to see where uninitialised values come from
==9657== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9657== 
==9657== 1 errors in context 1 of 2:
==9657== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9657==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9657==    by 0x488CD0: stringsubst (subst.c:301)
==9657==    by 0x48801B: prefork (subst.c:77)
==9657==    by 0x42B318: execcmd (exec.c:2619)
==9657==    by 0x428CA0: execpline2 (exec.c:1697)
==9657==    by 0x427FD2: execpline (exec.c:1484)
==9657==    by 0x427756: execlist (exec.c:1267)
==9657==    by 0x42717C: execode (exec.c:1073)
==9657==    by 0x431299: runshfunc (exec.c:5040)
==9657==    by 0x430E76: doshfunc (exec.c:4920)
==9657==    by 0x4302FB: execshfunc (exec.c:4557)
==9657==    by 0x42D8C1: execcmd (exec.c:3373)
==9657== 
==9657== 
==9657== 2 errors in context 2 of 2:
==9657== Conditional jump or move depends on uninitialised value(s)
==9657==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9657==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9657==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9657==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9657==    by 0x42D8E9: execcmd (exec.c:3378)
==9657==    by 0x428CA0: execpline2 (exec.c:1697)
==9657==    by 0x427FD2: execpline (exec.c:1484)
==9657==    by 0x42779A: execlist (exec.c:1275)
==9657==    by 0x42717C: execode (exec.c:1073)
==9657==    by 0x431299: runshfunc (exec.c:5040)
==9657==    by 0x430E76: doshfunc (exec.c:4920)
==9657==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9657== 
==9657== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9653-- Caught __NR_exit; running __libc_freeres()
--9653-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9653== 
==9653== HEAP SUMMARY:
==9653==     in use at exit: 3,121,105 bytes in 68,939 blocks
==9653==   total heap usage: 1,463,641 allocs, 1,394,702 frees, 117,967,639 bytes allocated
==9653== 
==9653== Searching for pointers to 68,939 not-freed blocks
--9653--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9653--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9653--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9653--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9653--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9653--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9653--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9653--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9653--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9653--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9653--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9653--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9653--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9653--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9653--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9653--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9653--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9653--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9653--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9653--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9653--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9653--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9653--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9653--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9653--   Scanning root segment: 0x701a000..0x701afff (4096)
--9653--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9653--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9653--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9653--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9653--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9653--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9653--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9653--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9653--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9653== Checked 4,765,856 bytes
==9653== 
==9653== LEAK SUMMARY:
==9653==    definitely lost: 2,181 bytes in 11 blocks
==9653==    indirectly lost: 6,756 bytes in 7 blocks
==9653==      possibly lost: 0 bytes in 0 blocks
==9653==    still reachable: 3,112,168 bytes in 68,921 blocks
==9653==         suppressed: 0 bytes in 0 blocks
==9653== Rerun with --leak-check=full to see details of leaked memory
==9653== 
==9653== Use --track-origins=yes to see where uninitialised values come from
==9653== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9653== 
==9653== 1 errors in context 1 of 2:
==9653== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9653==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9653==    by 0x488CD0: stringsubst (subst.c:301)
==9653==    by 0x48801B: prefork (subst.c:77)
==9653==    by 0x42B318: execcmd (exec.c:2619)
==9653==    by 0x428CA0: execpline2 (exec.c:1697)
==9653==    by 0x427FD2: execpline (exec.c:1484)
==9653==    by 0x427756: execlist (exec.c:1267)
==9653==    by 0x42717C: execode (exec.c:1073)
==9653==    by 0x431299: runshfunc (exec.c:5040)
==9653==    by 0x430E76: doshfunc (exec.c:4920)
==9653==    by 0x4302FB: execshfunc (exec.c:4557)
==9653==    by 0x42D8C1: execcmd (exec.c:3373)
==9653== 
==9653== 
==9653== 2 errors in context 2 of 2:
==9653== Conditional jump or move depends on uninitialised value(s)
==9653==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9653==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9653==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9653==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9653==    by 0x42D8E9: execcmd (exec.c:3378)
==9653==    by 0x428CA0: execpline2 (exec.c:1697)
==9653==    by 0x427FD2: execpline (exec.c:1484)
==9653==    by 0x42779A: execlist (exec.c:1275)
==9653==    by 0x42717C: execode (exec.c:1073)
==9653==    by 0x431299: runshfunc (exec.c:5040)
==9653==    by 0x430E76: doshfunc (exec.c:4920)
==9653==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9653== 
==9653== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9704-- Caught __NR_exit; running __libc_freeres()
==9704== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9704-by-pythonnut-on-???
==9704== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9704-by-pythonnut-on-???
==9704== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9704-by-pythonnut-on-???
==9704== 
==9704== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9704== don't want to do, unless you know exactly what you're doing,
==9704== or are doing some strange experiment):
==9704==   /usr/lib/valgrind/../../bin/vgdb --pid=9704 ...command...
==9704== 
==9704== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9704==   /path/to/gdb ./zsh
==9704== and then give GDB the following command
==9704==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9704
==9704== --pid is optional if only one valgrind process is running
==9704== 
==9705== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9705-by-pythonnut-on-???
==9705== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9705-by-pythonnut-on-???
==9705== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9705-by-pythonnut-on-???
==9705== 
==9705== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9705== don't want to do, unless you know exactly what you're doing,
==9705== or are doing some strange experiment):
==9705==   /usr/lib/valgrind/../../bin/vgdb --pid=9705 ...command...
==9705== 
==9705== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9705==   /path/to/gdb ./zsh
==9705== and then give GDB the following command
==9705==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9705
==9705== --pid is optional if only one valgrind process is running
==9705== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9704-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9704== 
==9704== HEAP SUMMARY:
==9704==     in use at exit: 3,122,749 bytes in 68,991 blocks
==9704==   total heap usage: 1,463,700 allocs, 1,394,709 frees, 117,972,407 bytes allocated
==9704== 
==9704== Searching for pointers to 68,991 not-freed blocks
--9704--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9704--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9704--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9704--   Scanning root segment: 0x4037000..0x403afff (16384)
--9704--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9704--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9704--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9704--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9704--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9704--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9704--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9704--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9704--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9704--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9704--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9704--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9704--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9704--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9704--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9704--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9704--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9704--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9704--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9704--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9704--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9704--   Scanning root segment: 0x701a000..0x701afff (4096)
--9704--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9704--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9704--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9704--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9704--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9704--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9704--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9704--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9704--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9704== Checked 4,784,424 bytes
==9704== 
==9704== LEAK SUMMARY:
==9704==    definitely lost: 2,181 bytes in 11 blocks
==9704==    indirectly lost: 6,756 bytes in 7 blocks
==9704==      possibly lost: 0 bytes in 0 blocks
==9704==    still reachable: 3,113,812 bytes in 68,973 blocks
==9704==         suppressed: 0 bytes in 0 blocks
==9704== Rerun with --leak-check=full to see details of leaked memory
==9704== 
==9704== Use --track-origins=yes to see where uninitialised values come from
==9704== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9704== 
==9704== 1 errors in context 1 of 2:
==9704== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9704==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9704==    by 0x488CD0: stringsubst (subst.c:301)
==9704==    by 0x48801B: prefork (subst.c:77)
==9704==    by 0x42B318: execcmd (exec.c:2619)
==9704==    by 0x428CA0: execpline2 (exec.c:1697)
==9704==    by 0x427FD2: execpline (exec.c:1484)
==9704==    by 0x427756: execlist (exec.c:1267)
==9704==    by 0x42717C: execode (exec.c:1073)
==9704==    by 0x431299: runshfunc (exec.c:5040)
==9704==    by 0x430E76: doshfunc (exec.c:4920)
==9704==    by 0x4302FB: execshfunc (exec.c:4557)
==9704==    by 0x42D8C1: execcmd (exec.c:3373)
==9704== 
==9704== 
==9704== 2 errors in context 2 of 2:
==9704== Conditional jump or move depends on uninitialised value(s)
==9704==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9704==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9704==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9704==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9704==    by 0x42D8E9: execcmd (exec.c:3378)
==9704==    by 0x428CA0: execpline2 (exec.c:1697)
==9704==    by 0x427FD2: execpline (exec.c:1484)
==9704==    by 0x42779A: execlist (exec.c:1275)
==9704==    by 0x42717C: execode (exec.c:1073)
==9704==    by 0x431299: runshfunc (exec.c:5040)
==9704==    by 0x430E76: doshfunc (exec.c:4920)
==9704==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9704== 
==9704== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9703== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9703-by-pythonnut-on-???
==9703== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9703-by-pythonnut-on-???
==9703== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9703-by-pythonnut-on-???
==9703== 
==9703== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9703== don't want to do, unless you know exactly what you're doing,
==9703== or are doing some strange experiment):
==9703==   /usr/lib/valgrind/../../bin/vgdb --pid=9703 ...command...
==9703== 
==9703== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9703==   /path/to/gdb ./zsh
==9703== and then give GDB the following command
==9703==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9703
==9703== --pid is optional if only one valgrind process is running
==9703== 
--9703-- Caught __NR_exit; running __libc_freeres()
--9703-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9703== 
==9703== HEAP SUMMARY:
==9703==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9703==   total heap usage: 1,463,702 allocs, 1,394,714 frees, 117,972,951 bytes allocated
==9703== 
==9703== Searching for pointers to 68,988 not-freed blocks
--9703--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9703--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9703--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9703--   Scanning root segment: 0x4037000..0x403afff (16384)
--9703--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9703--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9703--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9703--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9703--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9703--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9703--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9703--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9703--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9703--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9703--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9703--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9703--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9703--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9703--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9703--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9703--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9703--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9703--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9703--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9703--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9703--   Scanning root segment: 0x701a000..0x701afff (4096)
--9703--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9703--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9703--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9703--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9703--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9703--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9703--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9703--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9703--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9703== Checked 4,783,736 bytes
==9703== 
==9703== LEAK SUMMARY:
==9703==    definitely lost: 2,181 bytes in 11 blocks
==9703==    indirectly lost: 6,756 bytes in 7 blocks
==9703==      possibly lost: 0 bytes in 0 blocks
==9703==    still reachable: 3,113,748 bytes in 68,970 blocks
==9703==         suppressed: 0 bytes in 0 blocks
==9703== Rerun with --leak-check=full to see details of leaked memory
==9703== 
==9703== Use --track-origins=yes to see where uninitialised values come from
==9703== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9703== 
==9703== 1 errors in context 1 of 2:
==9703== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9703==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9703==    by 0x488CD0: stringsubst (subst.c:301)
==9703==    by 0x48801B: prefork (subst.c:77)
==9703==    by 0x42B318: execcmd (exec.c:2619)
==9703==    by 0x428CA0: execpline2 (exec.c:1697)
==9703==    by 0x427FD2: execpline (exec.c:1484)
==9703==    by 0x427756: execlist (exec.c:1267)
==9703==    by 0x42717C: execode (exec.c:1073)
==9703==    by 0x431299: runshfunc (exec.c:5040)
==9703==    by 0x430E76: doshfunc (exec.c:4920)
==9703==    by 0x4302FB: execshfunc (exec.c:4557)
==9703==    by 0x42D8C1: execcmd (exec.c:3373)
==9703== 
==9703== 
==9703== 2 errors in context 2 of 2:
==9703== Conditional jump or move depends on uninitialised value(s)
==9703==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9703==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9703==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9703==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9703==    by 0x42D8E9: execcmd (exec.c:3378)
==9703==    by 0x428CA0: execpline2 (exec.c:1697)
==9703==    by 0x427FD2: execpline (exec.c:1484)
==9703==    by 0x42779A: execlist (exec.c:1275)
==9703==    by 0x42717C: execode (exec.c:1073)
==9703==    by 0x431299: runshfunc (exec.c:5040)
==9703==    by 0x430E76: doshfunc (exec.c:4920)
==9703==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9703== 
==9703== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9706== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9706-by-pythonnut-on-???
==9706== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9706-by-pythonnut-on-???
==9706== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9706-by-pythonnut-on-???
==9706== 
==9706== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9706== don't want to do, unless you know exactly what you're doing,
==9706== or are doing some strange experiment):
==9706==   /usr/lib/valgrind/../../bin/vgdb --pid=9706 ...command...
==9706== 
==9706== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9706==   /path/to/gdb ./zsh
==9706== and then give GDB the following command
==9706==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9706
==9706== --pid is optional if only one valgrind process is running
==9706== 
--9706-- Caught __NR_exit; running __libc_freeres()
--9706-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9706== 
==9706== HEAP SUMMARY:
==9706==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9706==   total heap usage: 1,463,717 allocs, 1,394,729 frees, 117,977,935 bytes allocated
==9706== 
==9706== Searching for pointers to 68,988 not-freed blocks
--9706--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9706--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9706--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9706--   Scanning root segment: 0x4037000..0x403afff (16384)
--9706--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9706--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9706--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9706--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9706--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9706--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9706--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9706--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9706--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9706--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9706--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9706--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9706--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9706--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9706--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9706--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9706--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9706--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9706--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9706--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9706--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9706--   Scanning root segment: 0x701a000..0x701afff (4096)
--9706--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9706--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9706--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9706--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9706--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9706--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9706--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9706--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9706--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9706== Checked 4,783,736 bytes
==9706== 
==9706== LEAK SUMMARY:
==9706==    definitely lost: 2,181 bytes in 11 blocks
==9706==    indirectly lost: 6,756 bytes in 7 blocks
==9706==      possibly lost: 0 bytes in 0 blocks
==9706==    still reachable: 3,113,748 bytes in 68,970 blocks
==9706==         suppressed: 0 bytes in 0 blocks
==9706== Rerun with --leak-check=full to see details of leaked memory
==9706== 
==9706== Use --track-origins=yes to see where uninitialised values come from
==9706== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9706== 
==9706== 1 errors in context 1 of 2:
==9706== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9706==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9706==    by 0x488CD0: stringsubst (subst.c:301)
==9706==    by 0x48801B: prefork (subst.c:77)
==9706==    by 0x42B318: execcmd (exec.c:2619)
==9706==    by 0x428CA0: execpline2 (exec.c:1697)
==9706==    by 0x427FD2: execpline (exec.c:1484)
==9706==    by 0x427756: execlist (exec.c:1267)
==9706==    by 0x42717C: execode (exec.c:1073)
==9706==    by 0x431299: runshfunc (exec.c:5040)
==9706==    by 0x430E76: doshfunc (exec.c:4920)
==9706==    by 0x4302FB: execshfunc (exec.c:4557)
==9706==    by 0x42D8C1: execcmd (exec.c:3373)
==9706== 
==9706== 
==9706== 2 errors in context 2 of 2:
==9706== Conditional jump or move depends on uninitialised value(s)
==9706==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9706==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9706==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9706==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9706==    by 0x42D8E9: execcmd (exec.c:3378)
==9706==    by 0x428CA0: execpline2 (exec.c:1697)
==9706==    by 0x427FD2: execpline (exec.c:1484)
==9706==    by 0x42779A: execlist (exec.c:1275)
==9706==    by 0x42717C: execode (exec.c:1073)
==9706==    by 0x431299: runshfunc (exec.c:5040)
==9706==    by 0x430E76: doshfunc (exec.c:4920)
==9706==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9706== 
==9706== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9707== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9707-by-pythonnut-on-???
==9707== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9707-by-pythonnut-on-???
==9707== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9707-by-pythonnut-on-???
==9707== 
==9707== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9707== don't want to do, unless you know exactly what you're doing,
==9707== or are doing some strange experiment):
==9707==   /usr/lib/valgrind/../../bin/vgdb --pid=9707 ...command...
==9707== 
==9707== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9707==   /path/to/gdb ./zsh
==9707== and then give GDB the following command
==9707==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9707
==9707== --pid is optional if only one valgrind process is running
==9707== 
--9707-- Caught __NR_exit; running __libc_freeres()
--9707-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9707== 
==9707== HEAP SUMMARY:
==9707==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9707==   total heap usage: 1,463,722 allocs, 1,394,734 frees, 117,980,048 bytes allocated
==9707== 
==9707== Searching for pointers to 68,988 not-freed blocks
--9707--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9707--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9707--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9707--   Scanning root segment: 0x4037000..0x403afff (16384)
--9707--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9707--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9707--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9707--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9707--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9707--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9707--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9707--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9707--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9707--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9707--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9707--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9707--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9707--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9707--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9707--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9707--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9707--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9707--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9707--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9707--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9707--   Scanning root segment: 0x701a000..0x701afff (4096)
--9707--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9707--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9707--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9707--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9707--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9707--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9707--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9707--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9707--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9707== Checked 4,783,736 bytes
==9707== 
==9707== LEAK SUMMARY:
==9707==    definitely lost: 2,181 bytes in 11 blocks
==9707==    indirectly lost: 6,756 bytes in 7 blocks
==9707==      possibly lost: 0 bytes in 0 blocks
==9707==    still reachable: 3,113,748 bytes in 68,970 blocks
==9707==         suppressed: 0 bytes in 0 blocks
==9707== Rerun with --leak-check=full to see details of leaked memory
==9707== 
==9707== Use --track-origins=yes to see where uninitialised values come from
==9707== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9707== 
==9707== 1 errors in context 1 of 2:
==9707== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9707==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9707==    by 0x488CD0: stringsubst (subst.c:301)
==9707==    by 0x48801B: prefork (subst.c:77)
==9707==    by 0x42B318: execcmd (exec.c:2619)
==9707==    by 0x428CA0: execpline2 (exec.c:1697)
==9707==    by 0x427FD2: execpline (exec.c:1484)
==9707==    by 0x427756: execlist (exec.c:1267)
==9707==    by 0x42717C: execode (exec.c:1073)
==9707==    by 0x431299: runshfunc (exec.c:5040)
==9707==    by 0x430E76: doshfunc (exec.c:4920)
==9707==    by 0x4302FB: execshfunc (exec.c:4557)
==9707==    by 0x42D8C1: execcmd (exec.c:3373)
==9707== 
==9707== 
==9707== 2 errors in context 2 of 2:
==9707== Conditional jump or move depends on uninitialised value(s)
==9707==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9707==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9707==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9707==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9707==    by 0x42D8E9: execcmd (exec.c:3378)
==9707==    by 0x428CA0: execpline2 (exec.c:1697)
==9707==    by 0x427FD2: execpline (exec.c:1484)
==9707==    by 0x42779A: execlist (exec.c:1275)
==9707==    by 0x42717C: execode (exec.c:1073)
==9707==    by 0x431299: runshfunc (exec.c:5040)
==9707==    by 0x430E76: doshfunc (exec.c:4920)
==9707==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9707== 
==9707== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9708-- Caught __NR_exit; running __libc_freeres()
==9708== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9708-by-pythonnut-on-???
==9708== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9708-by-pythonnut-on-???
==9708== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9708-by-pythonnut-on-???
==9708== 
==9708== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9708== don't want to do, unless you know exactly what you're doing,
==9708== or are doing some strange experiment):
==9708==   /usr/lib/valgrind/../../bin/vgdb --pid=9708 ...command...
==9708== 
==9708== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9708==   /path/to/gdb ./zsh
==9708== and then give GDB the following command
==9708==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9708
==9708== --pid is optional if only one valgrind process is running
==9708== 
--9708-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9708== 
==9708== HEAP SUMMARY:
==9708==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9708==   total heap usage: 1,463,727 allocs, 1,394,739 frees, 117,982,161 bytes allocated
==9708== 
==9708== Searching for pointers to 68,988 not-freed blocks
--9708--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9708--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9708--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9708--   Scanning root segment: 0x4037000..0x403afff (16384)
--9708--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9708--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9708--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9708--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9708--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9708--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9708--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9708--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9708--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9708--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9708--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9708--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9708--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9708--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9708--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9708--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9708--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9708--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9708--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9708--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9708--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9708--   Scanning root segment: 0x701a000..0x701afff (4096)
--9708--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9708--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9708--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9708--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9708--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9708--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9708--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9708--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9708--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9708== Checked 4,783,736 bytes
==9708== 
==9708== LEAK SUMMARY:
==9708==    definitely lost: 2,181 bytes in 11 blocks
==9708==    indirectly lost: 6,756 bytes in 7 blocks
==9708==      possibly lost: 0 bytes in 0 blocks
==9708==    still reachable: 3,113,748 bytes in 68,970 blocks
==9708==         suppressed: 0 bytes in 0 blocks
==9708== Rerun with --leak-check=full to see details of leaked memory
==9708== 
==9708== Use --track-origins=yes to see where uninitialised values come from
==9708== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9708== 
==9708== 1 errors in context 1 of 2:
==9708== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9708==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9708==    by 0x488CD0: stringsubst (subst.c:301)
==9708==    by 0x48801B: prefork (subst.c:77)
==9708==    by 0x42B318: execcmd (exec.c:2619)
==9708==    by 0x428CA0: execpline2 (exec.c:1697)
==9708==    by 0x427FD2: execpline (exec.c:1484)
==9708==    by 0x427756: execlist (exec.c:1267)
==9708==    by 0x42717C: execode (exec.c:1073)
==9708==    by 0x431299: runshfunc (exec.c:5040)
==9708==    by 0x430E76: doshfunc (exec.c:4920)
==9708==    by 0x4302FB: execshfunc (exec.c:4557)
==9708==    by 0x42D8C1: execcmd (exec.c:3373)
==9708== 
==9708== 
==9708== 2 errors in context 2 of 2:
==9708== Conditional jump or move depends on uninitialised value(s)
==9708==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9708==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9708==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9708==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9708==    by 0x42D8E9: execcmd (exec.c:3378)
==9708==    by 0x428CA0: execpline2 (exec.c:1697)
==9708==    by 0x427FD2: execpline (exec.c:1484)
==9708==    by 0x42779A: execlist (exec.c:1275)
==9708==    by 0x42717C: execode (exec.c:1073)
==9708==    by 0x431299: runshfunc (exec.c:5040)
==9708==    by 0x430E76: doshfunc (exec.c:4920)
==9708==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9708== 
==9708== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9709== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9709-by-pythonnut-on-???
==9709== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9709-by-pythonnut-on-???
==9709== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9709-by-pythonnut-on-???
==9709== 
==9709== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9709== don't want to do, unless you know exactly what you're doing,
==9709== or are doing some strange experiment):
==9709==   /usr/lib/valgrind/../../bin/vgdb --pid=9709 ...command...
==9709== 
==9709== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9709==   /path/to/gdb ./zsh
==9709== and then give GDB the following command
==9709==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9709
==9709== --pid is optional if only one valgrind process is running
==9709== 
--9709-- Caught __NR_exit; running __libc_freeres()
--9709-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9709== 
==9709== HEAP SUMMARY:
==9709==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9709==   total heap usage: 1,463,732 allocs, 1,394,744 frees, 117,984,274 bytes allocated
==9709== 
==9709== Searching for pointers to 68,988 not-freed blocks
--9709--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9709--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9709--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9709--   Scanning root segment: 0x4037000..0x403afff (16384)
--9709--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9709--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9709--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9709--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9709--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9709--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9709--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9709--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9709--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9709--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9709--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9709--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9709--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9709--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9709--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9709--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9709--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9709--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9709--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9709--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9709--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9709--   Scanning root segment: 0x701a000..0x701afff (4096)
--9709--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9709--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9709--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9709--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9709--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9709--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9709--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9709--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9709--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9709== Checked 4,783,736 bytes
==9709== 
==9709== LEAK SUMMARY:
==9709==    definitely lost: 2,181 bytes in 11 blocks
==9709==    indirectly lost: 6,756 bytes in 7 blocks
==9709==      possibly lost: 0 bytes in 0 blocks
==9709==    still reachable: 3,113,748 bytes in 68,970 blocks
==9709==         suppressed: 0 bytes in 0 blocks
==9709== Rerun with --leak-check=full to see details of leaked memory
==9709== 
==9709== Use --track-origins=yes to see where uninitialised values come from
==9709== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9709== 
==9709== 1 errors in context 1 of 2:
==9709== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9709==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9709==    by 0x488CD0: stringsubst (subst.c:301)
==9709==    by 0x48801B: prefork (subst.c:77)
==9709==    by 0x42B318: execcmd (exec.c:2619)
==9709==    by 0x428CA0: execpline2 (exec.c:1697)
==9709==    by 0x427FD2: execpline (exec.c:1484)
==9709==    by 0x427756: execlist (exec.c:1267)
==9709==    by 0x42717C: execode (exec.c:1073)
==9709==    by 0x431299: runshfunc (exec.c:5040)
==9709==    by 0x430E76: doshfunc (exec.c:4920)
==9709==    by 0x4302FB: execshfunc (exec.c:4557)
==9709==    by 0x42D8C1: execcmd (exec.c:3373)
==9709== 
==9709== 
==9709== 2 errors in context 2 of 2:
==9709== Conditional jump or move depends on uninitialised value(s)
==9709==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9709==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9709==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9709==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9709==    by 0x42D8E9: execcmd (exec.c:3378)
==9709==    by 0x428CA0: execpline2 (exec.c:1697)
==9709==    by 0x427FD2: execpline (exec.c:1484)
==9709==    by 0x42779A: execlist (exec.c:1275)
==9709==    by 0x42717C: execode (exec.c:1073)
==9709==    by 0x431299: runshfunc (exec.c:5040)
==9709==    by 0x430E76: doshfunc (exec.c:4920)
==9709==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9709== 
==9709== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9712== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9712-by-pythonnut-on-???
==9712== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9712-by-pythonnut-on-???
==9712== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9712-by-pythonnut-on-???
==9712== 
==9712== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9712== don't want to do, unless you know exactly what you're doing,
==9712== or are doing some strange experiment):
==9712==   /usr/lib/valgrind/../../bin/vgdb --pid=9712 ...command...
==9712== 
==9712== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9712==   /path/to/gdb ./zsh
==9712== and then give GDB the following command
==9712==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9712
==9712== --pid is optional if only one valgrind process is running
==9712== 
--9712-- Caught __NR_exit; running __libc_freeres()
--9712-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9712== 
==9712== HEAP SUMMARY:
==9712==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9712==   total heap usage: 1,463,737 allocs, 1,394,749 frees, 117,986,387 bytes allocated
==9712== 
==9712== Searching for pointers to 68,988 not-freed blocks
--9712--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9712--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9712--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9712--   Scanning root segment: 0x4037000..0x403afff (16384)
--9712--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9712--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9712--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9712--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9712--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9712--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9712--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9712--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9712--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9712--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9712--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9712--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9712--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9712--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9712--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9712--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9712--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9712--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9712--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9712--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9712--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9712--   Scanning root segment: 0x701a000..0x701afff (4096)
--9712--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9712--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9712--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9712--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9712--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9712--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9712--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9712--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9712--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9712== Checked 4,783,736 bytes
==9712== 
==9712== LEAK SUMMARY:
==9712==    definitely lost: 2,181 bytes in 11 blocks
==9712==    indirectly lost: 6,756 bytes in 7 blocks
==9712==      possibly lost: 0 bytes in 0 blocks
==9712==    still reachable: 3,113,748 bytes in 68,970 blocks
==9712==         suppressed: 0 bytes in 0 blocks
==9712== Rerun with --leak-check=full to see details of leaked memory
==9712== 
==9712== Use --track-origins=yes to see where uninitialised values come from
==9712== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9712== 
==9712== 1 errors in context 1 of 2:
==9712== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9712==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9712==    by 0x488CD0: stringsubst (subst.c:301)
==9712==    by 0x48801B: prefork (subst.c:77)
==9712==    by 0x42B318: execcmd (exec.c:2619)
==9712==    by 0x428CA0: execpline2 (exec.c:1697)
==9712==    by 0x427FD2: execpline (exec.c:1484)
==9712==    by 0x427756: execlist (exec.c:1267)
==9712==    by 0x42717C: execode (exec.c:1073)
==9712==    by 0x431299: runshfunc (exec.c:5040)
==9712==    by 0x430E76: doshfunc (exec.c:4920)
==9712==    by 0x4302FB: execshfunc (exec.c:4557)
==9712==    by 0x42D8C1: execcmd (exec.c:3373)
==9712== 
==9712== 
==9712== 2 errors in context 2 of 2:
==9712== Conditional jump or move depends on uninitialised value(s)
==9712==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9712==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9712==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9712==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9712==    by 0x42D8E9: execcmd (exec.c:3378)
==9712==    by 0x428CA0: execpline2 (exec.c:1697)
==9712==    by 0x427FD2: execpline (exec.c:1484)
==9712==    by 0x42779A: execlist (exec.c:1275)
==9712==    by 0x42717C: execode (exec.c:1073)
==9712==    by 0x431299: runshfunc (exec.c:5040)
==9712==    by 0x430E76: doshfunc (exec.c:4920)
==9712==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9712== 
==9712== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9713== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9713-by-pythonnut-on-???
==9713== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9713-by-pythonnut-on-???
==9713== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9713-by-pythonnut-on-???
==9713== 
==9713== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9713== don't want to do, unless you know exactly what you're doing,
==9713== or are doing some strange experiment):
==9713==   /usr/lib/valgrind/../../bin/vgdb --pid=9713 ...command...
==9713== 
==9713== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9713==   /path/to/gdb ./zsh
==9713== and then give GDB the following command
==9713==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9713
==9713== --pid is optional if only one valgrind process is running
==9713== 
--9713-- Caught __NR_exit; running __libc_freeres()
--9713-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9713== 
==9713== HEAP SUMMARY:
==9713==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9713==   total heap usage: 1,463,742 allocs, 1,394,754 frees, 117,988,496 bytes allocated
==9713== 
==9713== Searching for pointers to 68,988 not-freed blocks
--9713--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9713--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9713--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9713--   Scanning root segment: 0x4037000..0x403afff (16384)
--9713--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9713--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9713--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9713--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9713--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9713--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9713--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9713--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9713--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9713--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9713--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9713--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9713--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9713--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9713--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9713--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9713--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9713--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9713--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9713--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9713--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9713--   Scanning root segment: 0x701a000..0x701afff (4096)
--9713--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9713--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9713--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9713--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9713--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9713--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9713--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9713--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9713--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9713== Checked 4,783,736 bytes
==9713== 
==9713== LEAK SUMMARY:
==9713==    definitely lost: 2,181 bytes in 11 blocks
==9713==    indirectly lost: 6,756 bytes in 7 blocks
==9713==      possibly lost: 0 bytes in 0 blocks
==9713==    still reachable: 3,113,748 bytes in 68,970 blocks
==9713==         suppressed: 0 bytes in 0 blocks
==9713== Rerun with --leak-check=full to see details of leaked memory
==9713== 
==9713== Use --track-origins=yes to see where uninitialised values come from
==9713== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9713== 
==9713== 1 errors in context 1 of 2:
==9713== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9713==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9713==    by 0x488CD0: stringsubst (subst.c:301)
==9713==    by 0x48801B: prefork (subst.c:77)
==9713==    by 0x42B318: execcmd (exec.c:2619)
==9713==    by 0x428CA0: execpline2 (exec.c:1697)
==9713==    by 0x427FD2: execpline (exec.c:1484)
==9713==    by 0x427756: execlist (exec.c:1267)
==9713==    by 0x42717C: execode (exec.c:1073)
==9713==    by 0x431299: runshfunc (exec.c:5040)
==9713==    by 0x430E76: doshfunc (exec.c:4920)
==9713==    by 0x4302FB: execshfunc (exec.c:4557)
==9713==    by 0x42D8C1: execcmd (exec.c:3373)
==9713== 
==9713== 
==9713== 2 errors in context 2 of 2:
==9713== Conditional jump or move depends on uninitialised value(s)
==9713==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9713==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9713==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9713==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9713==    by 0x42D8E9: execcmd (exec.c:3378)
==9713==    by 0x428CA0: execpline2 (exec.c:1697)
==9713==    by 0x427FD2: execpline (exec.c:1484)
==9713==    by 0x42779A: execlist (exec.c:1275)
==9713==    by 0x42717C: execode (exec.c:1073)
==9713==    by 0x431299: runshfunc (exec.c:5040)
==9713==    by 0x430E76: doshfunc (exec.c:4920)
==9713==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9713== 
==9713== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9714== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9714-by-pythonnut-on-???
==9714== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9714-by-pythonnut-on-???
==9714== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9714-by-pythonnut-on-???
==9714== 
==9714== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9714== don't want to do, unless you know exactly what you're doing,
==9714== or are doing some strange experiment):
==9714==   /usr/lib/valgrind/../../bin/vgdb --pid=9714 ...command...
==9714== 
==9714== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9714==   /path/to/gdb ./zsh
==9714== and then give GDB the following command
==9714==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9714
==9714== --pid is optional if only one valgrind process is running
==9714== 
--9714-- Caught __NR_exit; running __libc_freeres()
--9714-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9714== 
==9714== HEAP SUMMARY:
==9714==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9714==   total heap usage: 1,463,747 allocs, 1,394,759 frees, 117,990,613 bytes allocated
==9714== 
==9714== Searching for pointers to 68,988 not-freed blocks
--9714--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9714--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9714--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9714--   Scanning root segment: 0x4037000..0x403afff (16384)
--9714--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9714--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9714--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9714--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9714--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9714--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9714--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9714--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9714--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9714--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9714--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9714--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9714--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9714--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9714--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9714--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9714--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9714--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9714--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9714--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9714--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9714--   Scanning root segment: 0x701a000..0x701afff (4096)
--9714--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9714--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9714--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9714--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9714--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9714--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9714--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9714--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9714--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9714== Checked 4,783,736 bytes
==9714== 
==9714== LEAK SUMMARY:
==9714==    definitely lost: 2,181 bytes in 11 blocks
==9714==    indirectly lost: 6,756 bytes in 7 blocks
==9714==      possibly lost: 0 bytes in 0 blocks
==9714==    still reachable: 3,113,748 bytes in 68,970 blocks
==9714==         suppressed: 0 bytes in 0 blocks
==9714== Rerun with --leak-check=full to see details of leaked memory
==9714== 
==9714== Use --track-origins=yes to see where uninitialised values come from
==9714== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9714== 
==9714== 1 errors in context 1 of 2:
==9714== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9714==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9714==    by 0x488CD0: stringsubst (subst.c:301)
==9714==    by 0x48801B: prefork (subst.c:77)
==9714==    by 0x42B318: execcmd (exec.c:2619)
==9714==    by 0x428CA0: execpline2 (exec.c:1697)
==9714==    by 0x427FD2: execpline (exec.c:1484)
==9714==    by 0x427756: execlist (exec.c:1267)
==9714==    by 0x42717C: execode (exec.c:1073)
==9714==    by 0x431299: runshfunc (exec.c:5040)
==9714==    by 0x430E76: doshfunc (exec.c:4920)
==9714==    by 0x4302FB: execshfunc (exec.c:4557)
==9714==    by 0x42D8C1: execcmd (exec.c:3373)
==9714== 
==9714== 
==9714== 2 errors in context 2 of 2:
==9714== Conditional jump or move depends on uninitialised value(s)
==9714==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9714==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9714==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9714==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9714==    by 0x42D8E9: execcmd (exec.c:3378)
==9714==    by 0x428CA0: execpline2 (exec.c:1697)
==9714==    by 0x427FD2: execpline (exec.c:1484)
==9714==    by 0x42779A: execlist (exec.c:1275)
==9714==    by 0x42717C: execode (exec.c:1073)
==9714==    by 0x431299: runshfunc (exec.c:5040)
==9714==    by 0x430E76: doshfunc (exec.c:4920)
==9714==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9714== 
==9714== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9716-- Caught __NR_exit; running __libc_freeres()
==9717== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9717-by-pythonnut-on-???
==9717== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9717-by-pythonnut-on-???
==9717== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9717-by-pythonnut-on-???
==9717== 
==9717== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9717== don't want to do, unless you know exactly what you're doing,
==9717== or are doing some strange experiment):
==9717==   /usr/lib/valgrind/../../bin/vgdb --pid=9717 ...command...
==9717== 
==9717== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9717==   /path/to/gdb ./zsh
==9717== and then give GDB the following command
==9717==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9717
==9717== --pid is optional if only one valgrind process is running
==9717== 
==9716== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9716-by-pythonnut-on-???
==9716== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9716-by-pythonnut-on-???
==9716== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9716-by-pythonnut-on-???
==9716== 
==9716== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9716== don't want to do, unless you know exactly what you're doing,
==9716== or are doing some strange experiment):
==9716==   /usr/lib/valgrind/../../bin/vgdb --pid=9716 ...command...
==9716== 
==9716== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9716==   /path/to/gdb ./zsh
==9716== and then give GDB the following command
==9716==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9716
==9716== --pid is optional if only one valgrind process is running
==9716== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9716-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9716== 
==9716== HEAP SUMMARY:
==9716==     in use at exit: 3,122,841 bytes in 68,993 blocks
==9716==   total heap usage: 1,463,751 allocs, 1,394,758 frees, 117,994,035 bytes allocated
==9716== 
==9716== Searching for pointers to 68,993 not-freed blocks
--9716--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9716--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9716--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9716--   Scanning root segment: 0x4037000..0x403afff (16384)
--9716--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9716--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9716--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9716--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9716--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9716--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9716--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9716--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9716--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9716--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9716--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9716--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9716--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9716--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9716--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9716--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9716--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9716--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9716--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9716--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9716--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9716--   Scanning root segment: 0x701a000..0x701afff (4096)
--9716--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9716--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9716--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9716--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9716--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9716--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9716--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9716--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9716--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9716== Checked 4,784,512 bytes
==9716== 
==9716== LEAK SUMMARY:
==9716==    definitely lost: 2,181 bytes in 11 blocks
==9716==    indirectly lost: 6,756 bytes in 7 blocks
==9716==      possibly lost: 0 bytes in 0 blocks
==9716==    still reachable: 3,113,904 bytes in 68,975 blocks
==9716==         suppressed: 0 bytes in 0 blocks
==9716== Rerun with --leak-check=full to see details of leaked memory
==9716== 
==9716== Use --track-origins=yes to see where uninitialised values come from
==9716== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9716== 
==9716== 1 errors in context 1 of 2:
==9716== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9716==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9716==    by 0x488CD0: stringsubst (subst.c:301)
==9716==    by 0x48801B: prefork (subst.c:77)
==9716==    by 0x42B318: execcmd (exec.c:2619)
==9716==    by 0x428CA0: execpline2 (exec.c:1697)
==9716==    by 0x427FD2: execpline (exec.c:1484)
==9716==    by 0x427756: execlist (exec.c:1267)
==9716==    by 0x42717C: execode (exec.c:1073)
==9716==    by 0x431299: runshfunc (exec.c:5040)
==9716==    by 0x430E76: doshfunc (exec.c:4920)
==9716==    by 0x4302FB: execshfunc (exec.c:4557)
==9716==    by 0x42D8C1: execcmd (exec.c:3373)
==9716== 
==9716== 
==9716== 2 errors in context 2 of 2:
==9716== Conditional jump or move depends on uninitialised value(s)
==9716==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9716==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9716==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9716==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9716==    by 0x42D8E9: execcmd (exec.c:3378)
==9716==    by 0x428CA0: execpline2 (exec.c:1697)
==9716==    by 0x427FD2: execpline (exec.c:1484)
==9716==    by 0x42779A: execlist (exec.c:1275)
==9716==    by 0x42717C: execode (exec.c:1073)
==9716==    by 0x431299: runshfunc (exec.c:5040)
==9716==    by 0x430E76: doshfunc (exec.c:4920)
==9716==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9716== 
==9716== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9715== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9715-by-pythonnut-on-???
==9715== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9715-by-pythonnut-on-???
==9715== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9715-by-pythonnut-on-???
==9715== 
==9715== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9715== don't want to do, unless you know exactly what you're doing,
==9715== or are doing some strange experiment):
==9715==   /usr/lib/valgrind/../../bin/vgdb --pid=9715 ...command...
==9715== 
==9715== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9715==   /path/to/gdb ./zsh
==9715== and then give GDB the following command
==9715==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9715
==9715== --pid is optional if only one valgrind process is running
==9715== 
--9715-- Caught __NR_exit; running __libc_freeres()
--9715-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9715== 
==9715== HEAP SUMMARY:
==9715==     in use at exit: 3,122,777 bytes in 68,990 blocks
==9715==   total heap usage: 1,463,753 allocs, 1,394,763 frees, 117,994,579 bytes allocated
==9715== 
==9715== Searching for pointers to 68,990 not-freed blocks
--9715--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9715--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9715--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9715--   Scanning root segment: 0x4037000..0x403afff (16384)
--9715--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9715--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9715--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9715--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9715--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9715--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9715--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9715--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9715--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9715--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9715--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9715--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9715--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9715--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9715--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9715--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9715--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9715--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9715--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9715--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9715--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9715--   Scanning root segment: 0x701a000..0x701afff (4096)
--9715--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9715--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9715--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9715--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9715--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9715--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9715--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9715--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9715--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9715== Checked 4,783,824 bytes
==9715== 
==9715== LEAK SUMMARY:
==9715==    definitely lost: 2,181 bytes in 11 blocks
==9715==    indirectly lost: 6,756 bytes in 7 blocks
==9715==      possibly lost: 0 bytes in 0 blocks
==9715==    still reachable: 3,113,840 bytes in 68,972 blocks
==9715==         suppressed: 0 bytes in 0 blocks
==9715== Rerun with --leak-check=full to see details of leaked memory
==9715== 
==9715== Use --track-origins=yes to see where uninitialised values come from
==9715== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9715== 
==9715== 1 errors in context 1 of 2:
==9715== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9715==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9715==    by 0x488CD0: stringsubst (subst.c:301)
==9715==    by 0x48801B: prefork (subst.c:77)
==9715==    by 0x42B318: execcmd (exec.c:2619)
==9715==    by 0x428CA0: execpline2 (exec.c:1697)
==9715==    by 0x427FD2: execpline (exec.c:1484)
==9715==    by 0x427756: execlist (exec.c:1267)
==9715==    by 0x42717C: execode (exec.c:1073)
==9715==    by 0x431299: runshfunc (exec.c:5040)
==9715==    by 0x430E76: doshfunc (exec.c:4920)
==9715==    by 0x4302FB: execshfunc (exec.c:4557)
==9715==    by 0x42D8C1: execcmd (exec.c:3373)
==9715== 
==9715== 
==9715== 2 errors in context 2 of 2:
==9715== Conditional jump or move depends on uninitialised value(s)
==9715==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9715==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9715==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9715==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9715==    by 0x42D8E9: execcmd (exec.c:3378)
==9715==    by 0x428CA0: execpline2 (exec.c:1697)
==9715==    by 0x427FD2: execpline (exec.c:1484)
==9715==    by 0x42779A: execlist (exec.c:1275)
==9715==    by 0x42717C: execode (exec.c:1073)
==9715==    by 0x431299: runshfunc (exec.c:5040)
==9715==    by 0x430E76: doshfunc (exec.c:4920)
==9715==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9715== 
==9715== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9651-- Caught __NR_exit; running __libc_freeres()
--9651-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9651== 
==9651== HEAP SUMMARY:
==9651==     in use at exit: 3,120,309 bytes in 68,923 blocks
==9651==   total heap usage: 1,463,752 allocs, 1,394,829 frees, 117,996,163 bytes allocated
==9651== 
==9651== Searching for pointers to 68,923 not-freed blocks
--9651--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9651--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9651--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9651--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9651--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9651--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9651--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9651--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9651--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9651--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9651--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9651--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9651--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9651--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9651--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9651--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9651--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9651--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9651--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9651--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9651--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9651--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9651--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9651--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9651--   Scanning root segment: 0x701a000..0x701afff (4096)
--9651--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9651--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9651--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9651--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9651--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9651--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9651--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9651--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9651--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9651== Checked 4,761,952 bytes
==9651== 
==9651== LEAK SUMMARY:
==9651==    definitely lost: 2,181 bytes in 11 blocks
==9651==    indirectly lost: 6,756 bytes in 7 blocks
==9651==      possibly lost: 0 bytes in 0 blocks
==9651==    still reachable: 3,111,372 bytes in 68,905 blocks
==9651==         suppressed: 0 bytes in 0 blocks
==9651== Rerun with --leak-check=full to see details of leaked memory
==9651== 
==9651== Use --track-origins=yes to see where uninitialised values come from
==9651== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9651== 
==9651== 1 errors in context 1 of 2:
==9651== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9651==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9651==    by 0x488CD0: stringsubst (subst.c:301)
==9651==    by 0x48801B: prefork (subst.c:77)
==9651==    by 0x42B318: execcmd (exec.c:2619)
==9651==    by 0x428CA0: execpline2 (exec.c:1697)
==9651==    by 0x427FD2: execpline (exec.c:1484)
==9651==    by 0x427756: execlist (exec.c:1267)
==9651==    by 0x42717C: execode (exec.c:1073)
==9651==    by 0x431299: runshfunc (exec.c:5040)
==9651==    by 0x430E76: doshfunc (exec.c:4920)
==9651==    by 0x4302FB: execshfunc (exec.c:4557)
==9651==    by 0x42D8C1: execcmd (exec.c:3373)
==9651== 
==9651== 
==9651== 2 errors in context 2 of 2:
==9651== Conditional jump or move depends on uninitialised value(s)
==9651==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9651==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9651==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9651==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9651==    by 0x42D8E9: execcmd (exec.c:3378)
==9651==    by 0x428CA0: execpline2 (exec.c:1697)
==9651==    by 0x427FD2: execpline (exec.c:1484)
==9651==    by 0x42779A: execlist (exec.c:1275)
==9651==    by 0x42717C: execode (exec.c:1073)
==9651==    by 0x431299: runshfunc (exec.c:5040)
==9651==    by 0x430E76: doshfunc (exec.c:4920)
==9651==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9651== 
==9651== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9720== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9720-by-pythonnut-on-???
==9720== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9720-by-pythonnut-on-???
==9720== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9720-by-pythonnut-on-???
==9720== 
==9720== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9720== don't want to do, unless you know exactly what you're doing,
==9720== or are doing some strange experiment):
==9720==   /usr/lib/valgrind/../../bin/vgdb --pid=9720 ...command...
==9720== 
==9720== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9720==   /path/to/gdb ./zsh
==9720== and then give GDB the following command
==9720==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9720
==9720== --pid is optional if only one valgrind process is running
==9720== 
==9722== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9722-by-pythonnut-on-???
==9722== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9722-by-pythonnut-on-???
==9722== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9722-by-pythonnut-on-???
==9722== 
==9722== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9722== don't want to do, unless you know exactly what you're doing,
==9722== or are doing some strange experiment):
==9722==   /usr/lib/valgrind/../../bin/vgdb --pid=9722 ...command...
==9722== 
==9722== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9722==   /path/to/gdb ./zsh
==9722== and then give GDB the following command
==9722==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9722
==9722== --pid is optional if only one valgrind process is running
==9722== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==9721== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9721-by-pythonnut-on-???
==9721== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9721-by-pythonnut-on-???
==9721== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9721-by-pythonnut-on-???
==9721== 
==9721== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9721== don't want to do, unless you know exactly what you're doing,
==9721== or are doing some strange experiment):
==9721==   /usr/lib/valgrind/../../bin/vgdb --pid=9721 ...command...
==9721== 
==9721== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9721==   /path/to/gdb ./zsh
==9721== and then give GDB the following command
==9721==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9721
==9721== --pid is optional if only one valgrind process is running
==9721== 
--9721-- Caught __NR_exit; running __libc_freeres()
--9721-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9721== 
==9721== HEAP SUMMARY:
==9721==     in use at exit: 3,120,813 bytes in 68,935 blocks
==9721==   total heap usage: 1,463,596 allocs, 1,394,661 frees, 117,953,095 bytes allocated
==9721== 
==9721== Searching for pointers to 68,935 not-freed blocks
--9721--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9721--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9721--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9721--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9721--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9721--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9721--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9721--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9721--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9721--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9721--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9721--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9721--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9721--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9721--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9721--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9721--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9721--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9721--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9721--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9721--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9721--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9721--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9721--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9721--   Scanning root segment: 0x701a000..0x701afff (4096)
--9721--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9721--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9721--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9721--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9721--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9721--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9721--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9721--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9721--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9721== Checked 4,764,504 bytes
==9721== 
==9721== LEAK SUMMARY:
==9721==    definitely lost: 2,181 bytes in 11 blocks
==9721==    indirectly lost: 6,756 bytes in 7 blocks
==9721==      possibly lost: 0 bytes in 0 blocks
==9721==    still reachable: 3,111,876 bytes in 68,917 blocks
==9721==         suppressed: 0 bytes in 0 blocks
==9721== Rerun with --leak-check=full to see details of leaked memory
==9721== 
==9721== Use --track-origins=yes to see where uninitialised values come from
==9721== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9721== 
==9721== 1 errors in context 1 of 2:
==9721== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9721==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9721==    by 0x488CD0: stringsubst (subst.c:301)
==9721==    by 0x48801B: prefork (subst.c:77)
==9721==    by 0x42B318: execcmd (exec.c:2619)
==9721==    by 0x428CA0: execpline2 (exec.c:1697)
==9721==    by 0x427FD2: execpline (exec.c:1484)
==9721==    by 0x427756: execlist (exec.c:1267)
==9721==    by 0x42717C: execode (exec.c:1073)
==9721==    by 0x431299: runshfunc (exec.c:5040)
==9721==    by 0x430E76: doshfunc (exec.c:4920)
==9721==    by 0x4302FB: execshfunc (exec.c:4557)
==9721==    by 0x42D8C1: execcmd (exec.c:3373)
==9721== 
==9721== 
==9721== 2 errors in context 2 of 2:
==9721== Conditional jump or move depends on uninitialised value(s)
==9721==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9721==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9721==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9721==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9721==    by 0x42D8E9: execcmd (exec.c:3378)
==9721==    by 0x428CA0: execpline2 (exec.c:1697)
==9721==    by 0x427FD2: execpline (exec.c:1484)
==9721==    by 0x42779A: execlist (exec.c:1275)
==9721==    by 0x42717C: execode (exec.c:1073)
==9721==    by 0x431299: runshfunc (exec.c:5040)
==9721==    by 0x430E76: doshfunc (exec.c:4920)
==9721==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9721== 
==9721== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9723-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9723== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9723-by-pythonnut-on-???
==9723== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9723-by-pythonnut-on-???
==9723== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9723-by-pythonnut-on-???
==9723== 
==9723== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9723== don't want to do, unless you know exactly what you're doing,
==9723== or are doing some strange experiment):
==9723==   /usr/lib/valgrind/../../bin/vgdb --pid=9723 ...command...
==9723== 
==9723== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9723==   /path/to/gdb ./zsh
==9723== and then give GDB the following command
==9723==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9723
==9723== --pid is optional if only one valgrind process is running
==9723== 
client request: code 4d430005,  addr 0xFFEFFB37C,  len 4
client request: code 4d430005,  addr 0xFFEFF836C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF895C,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFEEBFC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
==9725== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9725-by-pythonnut-on-???
==9725== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9725-by-pythonnut-on-???
==9725== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9725-by-pythonnut-on-???
==9725== 
==9725== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9725== don't want to do, unless you know exactly what you're doing,
==9725== or are doing some strange experiment):
==9725==   /usr/lib/valgrind/../../bin/vgdb --pid=9725 ...command...
==9725== 
==9725== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9725==   /path/to/gdb ./zsh
==9725== and then give GDB the following command
==9725==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9725
==9725== --pid is optional if only one valgrind process is running
==9725== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
==9726== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9726-by-pythonnut-on-???
==9726== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9726-by-pythonnut-on-???
==9726== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9726-by-pythonnut-on-???
==9726== 
==9726== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9726== don't want to do, unless you know exactly what you're doing,
==9726== or are doing some strange experiment):
==9726==   /usr/lib/valgrind/../../bin/vgdb --pid=9726 ...command...
==9726== 
==9726== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9726==   /path/to/gdb ./zsh
==9726== and then give GDB the following command
==9726==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9726
==9726== --pid is optional if only one valgrind process is running
==9726== 
--9726-- Caught __NR_exit; running __libc_freeres()
--9726-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9726== 
==9726== HEAP SUMMARY:
==9726==     in use at exit: 3,152,460 bytes in 69,433 blocks
==9726==   total heap usage: 1,467,367 allocs, 1,397,934 frees, 119,723,070 bytes allocated
==9726== 
==9726== Searching for pointers to 69,433 not-freed blocks
--9726--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9726--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9726--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9726--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9726--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9726--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9726--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9726--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9726--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9726--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9726--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9726--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9726--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9726--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9726--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9726--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9726--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9726--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9726--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9726--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9726--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9726--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9726--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9726--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9726--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9726--   Scanning root segment: 0x701a000..0x701afff (4096)
--9726--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9726--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9726--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9726--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9726--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9726--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9726--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9726--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9726--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9726== Checked 4,852,528 bytes
==9726== 
==9726== LEAK SUMMARY:
==9726==    definitely lost: 2,181 bytes in 11 blocks
==9726==    indirectly lost: 6,756 bytes in 7 blocks
==9726==      possibly lost: 0 bytes in 0 blocks
==9726==    still reachable: 3,143,523 bytes in 69,415 blocks
==9726==         suppressed: 0 bytes in 0 blocks
==9726== Rerun with --leak-check=full to see details of leaked memory
==9726== 
==9726== Use --track-origins=yes to see where uninitialised values come from
==9726== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9726== 
==9726== 1 errors in context 1 of 2:
==9726== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9726==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9726==    by 0x488CD0: stringsubst (subst.c:301)
==9726==    by 0x48801B: prefork (subst.c:77)
==9726==    by 0x42B318: execcmd (exec.c:2619)
==9726==    by 0x428CA0: execpline2 (exec.c:1697)
==9726==    by 0x427FD2: execpline (exec.c:1484)
==9726==    by 0x427756: execlist (exec.c:1267)
==9726==    by 0x42717C: execode (exec.c:1073)
==9726==    by 0x431299: runshfunc (exec.c:5040)
==9726==    by 0x430E76: doshfunc (exec.c:4920)
==9726==    by 0x4302FB: execshfunc (exec.c:4557)
==9726==    by 0x42D8C1: execcmd (exec.c:3373)
==9726== 
==9726== 
==9726== 2 errors in context 2 of 2:
==9726== Conditional jump or move depends on uninitialised value(s)
==9726==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9726==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9726==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9726==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9726==    by 0x42D8E9: execcmd (exec.c:3378)
==9726==    by 0x428CA0: execpline2 (exec.c:1697)
==9726==    by 0x427FD2: execpline (exec.c:1484)
==9726==    by 0x42779A: execlist (exec.c:1275)
==9726==    by 0x42717C: execode (exec.c:1073)
==9726==    by 0x431299: runshfunc (exec.c:5040)
==9726==    by 0x430E76: doshfunc (exec.c:4920)
==9726==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9726== 
==9726== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9725-- Caught __NR_exit; running __libc_freeres()
--9725-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9725== 
==9725== HEAP SUMMARY:
==9725==     in use at exit: 3,150,178 bytes in 69,353 blocks
==9725==   total heap usage: 1,467,272 allocs, 1,397,919 frees, 119,491,131 bytes allocated
==9725== 
==9725== Searching for pointers to 69,353 not-freed blocks
--9725--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9725--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9725--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9725--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9725--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9725--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9725--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9725--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9725--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9725--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9725--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9725--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9725--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9725--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9725--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9725--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9725--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9725--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9725--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9725--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9725--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9725--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9725--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9725--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9725--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9725--   Scanning root segment: 0x701a000..0x701afff (4096)
--9725--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9725--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9725--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9725--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9725--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9725--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9725--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9725--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9725--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9725== Checked 4,848,552 bytes
==9725== 
==9725== LEAK SUMMARY:
==9725==    definitely lost: 2,181 bytes in 11 blocks
==9725==    indirectly lost: 6,756 bytes in 7 blocks
==9725==      possibly lost: 0 bytes in 0 blocks
==9725==    still reachable: 3,141,241 bytes in 69,335 blocks
==9725==         suppressed: 0 bytes in 0 blocks
==9725== Rerun with --leak-check=full to see details of leaked memory
==9725== 
==9725== Use --track-origins=yes to see where uninitialised values come from
==9725== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9725== 
==9725== 1 errors in context 1 of 2:
==9725== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9725==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9725==    by 0x488CD0: stringsubst (subst.c:301)
==9725==    by 0x48801B: prefork (subst.c:77)
==9725==    by 0x42B318: execcmd (exec.c:2619)
==9725==    by 0x428CA0: execpline2 (exec.c:1697)
==9725==    by 0x427FD2: execpline (exec.c:1484)
==9725==    by 0x427756: execlist (exec.c:1267)
==9725==    by 0x42717C: execode (exec.c:1073)
==9725==    by 0x431299: runshfunc (exec.c:5040)
==9725==    by 0x430E76: doshfunc (exec.c:4920)
==9725==    by 0x4302FB: execshfunc (exec.c:4557)
==9725==    by 0x42D8C1: execcmd (exec.c:3373)
==9725== 
==9725== 
==9725== 2 errors in context 2 of 2:
==9725== Conditional jump or move depends on uninitialised value(s)
==9725==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9725==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9725==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9725==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9725==    by 0x42D8E9: execcmd (exec.c:3378)
==9725==    by 0x428CA0: execpline2 (exec.c:1697)
==9725==    by 0x427FD2: execpline (exec.c:1484)
==9725==    by 0x42779A: execlist (exec.c:1275)
==9725==    by 0x42717C: execode (exec.c:1073)
==9725==    by 0x431299: runshfunc (exec.c:5040)
==9725==    by 0x430E76: doshfunc (exec.c:4920)
==9725==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9725== 
==9725== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9727== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9727-by-pythonnut-on-???
==9727== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9727-by-pythonnut-on-???
==9727== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9727-by-pythonnut-on-???
==9727== 
==9727== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9727== don't want to do, unless you know exactly what you're doing,
==9727== or are doing some strange experiment):
==9727==   /usr/lib/valgrind/../../bin/vgdb --pid=9727 ...command...
==9727== 
==9727== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9727==   /path/to/gdb ./zsh
==9727== and then give GDB the following command
==9727==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9727
==9727== --pid is optional if only one valgrind process is running
==9727== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==9728== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9728-by-pythonnut-on-???
==9728== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9728-by-pythonnut-on-???
==9728== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9728-by-pythonnut-on-???
==9728== 
==9728== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9728== don't want to do, unless you know exactly what you're doing,
==9728== or are doing some strange experiment):
==9728==   /usr/lib/valgrind/../../bin/vgdb --pid=9728 ...command...
==9728== 
==9728== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9728==   /path/to/gdb ./zsh
==9728== and then give GDB the following command
==9728==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9728
==9728== --pid is optional if only one valgrind process is running
==9728== 
--9728-- Caught __NR_exit; running __libc_freeres()
--9728-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9728== 
==9728== HEAP SUMMARY:
==9728==     in use at exit: 3,152,707 bytes in 69,441 blocks
==9728==   total heap usage: 1,467,384 allocs, 1,397,943 frees, 119,693,241 bytes allocated
==9728== 
==9728== Searching for pointers to 69,441 not-freed blocks
--9728--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9728--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9728--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9728--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9728--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9728--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9728--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9728--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9728--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9728--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9728--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9728--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9728--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9728--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9728--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9728--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9728--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9728--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9728--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9728--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9728--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9728--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9728--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9728--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9728--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9728--   Scanning root segment: 0x701a000..0x701afff (4096)
--9728--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9728--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9728--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9728--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9728--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9728--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9728--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9728--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9728--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9728== Checked 4,853,256 bytes
==9728== 
==9728== LEAK SUMMARY:
==9728==    definitely lost: 2,181 bytes in 11 blocks
==9728==    indirectly lost: 6,756 bytes in 7 blocks
==9728==      possibly lost: 0 bytes in 0 blocks
==9728==    still reachable: 3,143,770 bytes in 69,423 blocks
==9728==         suppressed: 0 bytes in 0 blocks
==9728== Rerun with --leak-check=full to see details of leaked memory
==9728== 
==9728== Use --track-origins=yes to see where uninitialised values come from
==9728== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9728== 
==9728== 1 errors in context 1 of 2:
==9728== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9728==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9728==    by 0x488CD0: stringsubst (subst.c:301)
==9728==    by 0x48801B: prefork (subst.c:77)
==9728==    by 0x42B318: execcmd (exec.c:2619)
==9728==    by 0x428CA0: execpline2 (exec.c:1697)
==9728==    by 0x427FD2: execpline (exec.c:1484)
==9728==    by 0x427756: execlist (exec.c:1267)
==9728==    by 0x42717C: execode (exec.c:1073)
==9728==    by 0x431299: runshfunc (exec.c:5040)
==9728==    by 0x430E76: doshfunc (exec.c:4920)
==9728==    by 0x4302FB: execshfunc (exec.c:4557)
==9728==    by 0x42D8C1: execcmd (exec.c:3373)
==9728== 
==9728== 
==9728== 2 errors in context 2 of 2:
==9728== Conditional jump or move depends on uninitialised value(s)
==9728==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9728==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9728==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9728==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9728==    by 0x42D8E9: execcmd (exec.c:3378)
==9728==    by 0x428CA0: execpline2 (exec.c:1697)
==9728==    by 0x427FD2: execpline (exec.c:1484)
==9728==    by 0x42779A: execlist (exec.c:1275)
==9728==    by 0x42717C: execode (exec.c:1073)
==9728==    by 0x431299: runshfunc (exec.c:5040)
==9728==    by 0x430E76: doshfunc (exec.c:4920)
==9728==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9728== 
==9728== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9727-- Caught __NR_exit; running __libc_freeres()
--9727-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9727== 
==9727== HEAP SUMMARY:
==9727==     in use at exit: 3,150,451 bytes in 69,361 blocks
==9727==   total heap usage: 1,467,287 allocs, 1,397,926 frees, 119,494,044 bytes allocated
==9727== 
==9727== Searching for pointers to 69,361 not-freed blocks
--9727--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9727--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9727--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9727--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9727--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9727--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9727--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9727--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9727--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9727--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9727--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9727--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9727--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9727--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9727--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9727--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9727--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9727--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9727--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9727--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9727--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9727--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9727--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9727--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9727--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9727--   Scanning root segment: 0x701a000..0x701afff (4096)
--9727--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9727--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9727--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9727--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9727--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9727--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9727--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9727--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9727--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9727== Checked 4,849,312 bytes
==9727== 
==9727== LEAK SUMMARY:
==9727==    definitely lost: 2,181 bytes in 11 blocks
==9727==    indirectly lost: 6,756 bytes in 7 blocks
==9727==      possibly lost: 0 bytes in 0 blocks
==9727==    still reachable: 3,141,514 bytes in 69,343 blocks
==9727==         suppressed: 0 bytes in 0 blocks
==9727== Rerun with --leak-check=full to see details of leaked memory
==9727== 
==9727== Use --track-origins=yes to see where uninitialised values come from
==9727== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9727== 
==9727== 1 errors in context 1 of 2:
==9727== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9727==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9727==    by 0x488CD0: stringsubst (subst.c:301)
==9727==    by 0x48801B: prefork (subst.c:77)
==9727==    by 0x42B318: execcmd (exec.c:2619)
==9727==    by 0x428CA0: execpline2 (exec.c:1697)
==9727==    by 0x427FD2: execpline (exec.c:1484)
==9727==    by 0x427756: execlist (exec.c:1267)
==9727==    by 0x42717C: execode (exec.c:1073)
==9727==    by 0x431299: runshfunc (exec.c:5040)
==9727==    by 0x430E76: doshfunc (exec.c:4920)
==9727==    by 0x4302FB: execshfunc (exec.c:4557)
==9727==    by 0x42D8C1: execcmd (exec.c:3373)
==9727== 
==9727== 
==9727== 2 errors in context 2 of 2:
==9727== Conditional jump or move depends on uninitialised value(s)
==9727==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9727==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9727==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9727==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9727==    by 0x42D8E9: execcmd (exec.c:3378)
==9727==    by 0x428CA0: execpline2 (exec.c:1697)
==9727==    by 0x427FD2: execpline (exec.c:1484)
==9727==    by 0x42779A: execlist (exec.c:1275)
==9727==    by 0x42717C: execode (exec.c:1073)
==9727==    by 0x431299: runshfunc (exec.c:5040)
==9727==    by 0x430E76: doshfunc (exec.c:4920)
==9727==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9727== 
==9727== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFEE74C,  len 4
--9731-- Caught __NR_exit; running __libc_freeres()
==9731== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9731-by-pythonnut-on-???
==9731== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9731-by-pythonnut-on-???
==9731== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9731-by-pythonnut-on-???
==9731== 
==9731== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9731== don't want to do, unless you know exactly what you're doing,
==9731== or are doing some strange experiment):
==9731==   /usr/lib/valgrind/../../bin/vgdb --pid=9731 ...command...
==9731== 
==9731== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9731==   /path/to/gdb ./zsh
==9731== and then give GDB the following command
==9731==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9731
==9731== --pid is optional if only one valgrind process is running
==9731== 
--9731-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9731== 
==9731== HEAP SUMMARY:
==9731==     in use at exit: 3,152,278 bytes in 69,352 blocks
==9731==   total heap usage: 1,467,400 allocs, 1,398,048 frees, 119,509,507 bytes allocated
==9731== 
==9731== Searching for pointers to 69,352 not-freed blocks
--9731--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9731--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9731--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9731--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9731--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9731--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9731--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9731--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9731--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9731--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9731--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9731--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9731--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9731--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9731--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9731--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9731--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9731--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9731--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9731--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9731--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9731--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9731--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9731--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9731--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9731--   Scanning root segment: 0x701a000..0x701afff (4096)
--9731--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9731--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9731--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9731--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9731--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9731--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9731--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9731--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9731--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9731== Checked 4,849,544 bytes
==9731== 
==9731== LEAK SUMMARY:
==9731==    definitely lost: 2,181 bytes in 11 blocks
==9731==    indirectly lost: 6,756 bytes in 7 blocks
==9731==      possibly lost: 0 bytes in 0 blocks
==9731==    still reachable: 3,143,341 bytes in 69,334 blocks
==9731==         suppressed: 0 bytes in 0 blocks
==9731== Rerun with --leak-check=full to see details of leaked memory
==9731== 
==9731== Use --track-origins=yes to see where uninitialised values come from
==9731== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9731== 
==9731== 1 errors in context 1 of 2:
==9731== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9731==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9731==    by 0x488CD0: stringsubst (subst.c:301)
==9731==    by 0x48801B: prefork (subst.c:77)
==9731==    by 0x42B318: execcmd (exec.c:2619)
==9731==    by 0x428CA0: execpline2 (exec.c:1697)
==9731==    by 0x427FD2: execpline (exec.c:1484)
==9731==    by 0x427756: execlist (exec.c:1267)
==9731==    by 0x42717C: execode (exec.c:1073)
==9731==    by 0x431299: runshfunc (exec.c:5040)
==9731==    by 0x430E76: doshfunc (exec.c:4920)
==9731==    by 0x4302FB: execshfunc (exec.c:4557)
==9731==    by 0x42D8C1: execcmd (exec.c:3373)
==9731== 
==9731== 
==9731== 2 errors in context 2 of 2:
==9731== Conditional jump or move depends on uninitialised value(s)
==9731==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9731==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9731==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9731==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9731==    by 0x42D8E9: execcmd (exec.c:3378)
==9731==    by 0x428CA0: execpline2 (exec.c:1697)
==9731==    by 0x427FD2: execpline (exec.c:1484)
==9731==    by 0x42779A: execlist (exec.c:1275)
==9731==    by 0x42717C: execode (exec.c:1073)
==9731==    by 0x431299: runshfunc (exec.c:5040)
==9731==    by 0x430E76: doshfunc (exec.c:4920)
==9731==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9731== 
==9731== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9733== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9733-by-pythonnut-on-???
==9733== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9733-by-pythonnut-on-???
==9733== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9733-by-pythonnut-on-???
==9733== 
==9733== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9733== don't want to do, unless you know exactly what you're doing,
==9733== or are doing some strange experiment):
==9733==   /usr/lib/valgrind/../../bin/vgdb --pid=9733 ...command...
==9733== 
==9733== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9733==   /path/to/gdb ./zsh
==9733== and then give GDB the following command
==9733==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9733
==9733== --pid is optional if only one valgrind process is running
==9733== 
--9733-- Caught __NR_exit; running __libc_freeres()
--9733-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9733== 
==9733== HEAP SUMMARY:
==9733==     in use at exit: 3,151,462 bytes in 69,308 blocks
==9733==   total heap usage: 1,467,357 allocs, 1,398,049 frees, 119,508,989 bytes allocated
==9733== 
==9733== Searching for pointers to 69,308 not-freed blocks
--9733--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9733--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9733--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9733--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9733--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9733--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9733--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9733--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9733--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9733--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9733--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9733--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9733--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9733--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9733--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9733--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9733--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9733--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9733--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9733--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9733--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9733--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9733--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9733--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9733--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9733--   Scanning root segment: 0x701a000..0x701afff (4096)
--9733--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9733--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9733--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9733--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9733--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9733--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9733--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9733--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9733--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9733== Checked 4,848,224 bytes
==9733== 
==9733== LEAK SUMMARY:
==9733==    definitely lost: 2,181 bytes in 11 blocks
==9733==    indirectly lost: 6,756 bytes in 7 blocks
==9733==      possibly lost: 0 bytes in 0 blocks
==9733==    still reachable: 3,142,525 bytes in 69,290 blocks
==9733==         suppressed: 0 bytes in 0 blocks
==9733== Rerun with --leak-check=full to see details of leaked memory
==9733== 
==9733== Use --track-origins=yes to see where uninitialised values come from
==9733== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9733== 
==9733== 1 errors in context 1 of 2:
==9733== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9733==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9733==    by 0x488CD0: stringsubst (subst.c:301)
==9733==    by 0x48801B: prefork (subst.c:77)
==9733==    by 0x42B318: execcmd (exec.c:2619)
==9733==    by 0x428CA0: execpline2 (exec.c:1697)
==9733==    by 0x427FD2: execpline (exec.c:1484)
==9733==    by 0x427756: execlist (exec.c:1267)
==9733==    by 0x42717C: execode (exec.c:1073)
==9733==    by 0x431299: runshfunc (exec.c:5040)
==9733==    by 0x430E76: doshfunc (exec.c:4920)
==9733==    by 0x4302FB: execshfunc (exec.c:4557)
==9733==    by 0x42D8C1: execcmd (exec.c:3373)
==9733== 
==9733== 
==9733== 2 errors in context 2 of 2:
==9733== Conditional jump or move depends on uninitialised value(s)
==9733==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9733==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9733==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9733==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9733==    by 0x42D8E9: execcmd (exec.c:3378)
==9733==    by 0x428CA0: execpline2 (exec.c:1697)
==9733==    by 0x427FD2: execpline (exec.c:1484)
==9733==    by 0x42779A: execlist (exec.c:1275)
==9733==    by 0x42717C: execode (exec.c:1073)
==9733==    by 0x431299: runshfunc (exec.c:5040)
==9733==    by 0x430E76: doshfunc (exec.c:4920)
==9733==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9733== 
==9733== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF2EC,  len 4
==9736== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9736-by-pythonnut-on-???
==9736== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9736-by-pythonnut-on-???
==9736== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9736-by-pythonnut-on-???
==9736== 
==9736== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9736== don't want to do, unless you know exactly what you're doing,
==9736== or are doing some strange experiment):
==9736==   /usr/lib/valgrind/../../bin/vgdb --pid=9736 ...command...
==9736== 
==9736== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9736==   /path/to/gdb ./zsh
==9736== and then give GDB the following command
==9736==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9736
==9736== --pid is optional if only one valgrind process is running
==9736== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
==9737== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9737-by-pythonnut-on-???
==9737== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9737-by-pythonnut-on-???
==9737== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9737-by-pythonnut-on-???
==9737== 
==9737== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9737== don't want to do, unless you know exactly what you're doing,
==9737== or are doing some strange experiment):
==9737==   /usr/lib/valgrind/../../bin/vgdb --pid=9737 ...command...
==9737== 
==9737== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9737==   /path/to/gdb ./zsh
==9737== and then give GDB the following command
==9737==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9737
==9737== --pid is optional if only one valgrind process is running
==9737== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
--9737-- Caught __NR_exit; running __libc_freeres()
--9737-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9737== 
==9737== HEAP SUMMARY:
==9737==     in use at exit: 3,159,266 bytes in 69,532 blocks
==9737==   total heap usage: 1,468,133 allocs, 1,398,601 frees, 119,795,165 bytes allocated
==9737== 
==9737== Searching for pointers to 69,532 not-freed blocks
--9737--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9737--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9737--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9737--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9737--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9737--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9737--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9737--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9737--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9737--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9737--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9737--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9737--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9737--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9737--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9737--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9737--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9737--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9737--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9737--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9737--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9737--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9737--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9737--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9737--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9737--   Scanning root segment: 0x701a000..0x701afff (4096)
--9737--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9737--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9737--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9737--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9737--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9737--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9737--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9737--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9737--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9737== Checked 4,856,912 bytes
==9737== 
==9737== LEAK SUMMARY:
==9737==    definitely lost: 2,181 bytes in 11 blocks
==9737==    indirectly lost: 6,756 bytes in 7 blocks
==9737==      possibly lost: 0 bytes in 0 blocks
==9737==    still reachable: 3,150,329 bytes in 69,514 blocks
==9737==         suppressed: 0 bytes in 0 blocks
==9737== Rerun with --leak-check=full to see details of leaked memory
==9737== 
==9737== Use --track-origins=yes to see where uninitialised values come from
==9737== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9737== 
==9737== 1 errors in context 1 of 2:
==9737== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9737==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9737==    by 0x488CD0: stringsubst (subst.c:301)
==9737==    by 0x48801B: prefork (subst.c:77)
==9737==    by 0x42B318: execcmd (exec.c:2619)
==9737==    by 0x428CA0: execpline2 (exec.c:1697)
==9737==    by 0x427FD2: execpline (exec.c:1484)
==9737==    by 0x427756: execlist (exec.c:1267)
==9737==    by 0x42717C: execode (exec.c:1073)
==9737==    by 0x431299: runshfunc (exec.c:5040)
==9737==    by 0x430E76: doshfunc (exec.c:4920)
==9737==    by 0x4302FB: execshfunc (exec.c:4557)
==9737==    by 0x42D8C1: execcmd (exec.c:3373)
==9737== 
==9737== 
==9737== 2 errors in context 2 of 2:
==9737== Conditional jump or move depends on uninitialised value(s)
==9737==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9737==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9737==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9737==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9737==    by 0x42D8E9: execcmd (exec.c:3378)
==9737==    by 0x428CA0: execpline2 (exec.c:1697)
==9737==    by 0x427FD2: execpline (exec.c:1484)
==9737==    by 0x42779A: execlist (exec.c:1275)
==9737==    by 0x42717C: execode (exec.c:1073)
==9737==    by 0x431299: runshfunc (exec.c:5040)
==9737==    by 0x430E76: doshfunc (exec.c:4920)
==9737==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9737== 
==9737== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9736-- Caught __NR_exit; running __libc_freeres()
--9736-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9736== 
==9736== HEAP SUMMARY:
==9736==     in use at exit: 3,156,914 bytes in 69,452 blocks
==9736==   total heap usage: 1,468,039 allocs, 1,398,587 frees, 119,595,970 bytes allocated
==9736== 
==9736== Searching for pointers to 69,452 not-freed blocks
--9736--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9736--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9736--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9736--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9736--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9736--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9736--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9736--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9736--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9736--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9736--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9736--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9736--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9736--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9736--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9736--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9736--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9736--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9736--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9736--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9736--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9736--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9736--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9736--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9736--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9736--   Scanning root segment: 0x701a000..0x701afff (4096)
--9736--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9736--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9736--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9736--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9736--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9736--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9736--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9736--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9736--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9736== Checked 4,852,864 bytes
==9736== 
==9736== LEAK SUMMARY:
==9736==    definitely lost: 2,181 bytes in 11 blocks
==9736==    indirectly lost: 6,756 bytes in 7 blocks
==9736==      possibly lost: 0 bytes in 0 blocks
==9736==    still reachable: 3,147,977 bytes in 69,434 blocks
==9736==         suppressed: 0 bytes in 0 blocks
==9736== Rerun with --leak-check=full to see details of leaked memory
==9736== 
==9736== Use --track-origins=yes to see where uninitialised values come from
==9736== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9736== 
==9736== 1 errors in context 1 of 2:
==9736== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9736==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9736==    by 0x488CD0: stringsubst (subst.c:301)
==9736==    by 0x48801B: prefork (subst.c:77)
==9736==    by 0x42B318: execcmd (exec.c:2619)
==9736==    by 0x428CA0: execpline2 (exec.c:1697)
==9736==    by 0x427FD2: execpline (exec.c:1484)
==9736==    by 0x427756: execlist (exec.c:1267)
==9736==    by 0x42717C: execode (exec.c:1073)
==9736==    by 0x431299: runshfunc (exec.c:5040)
==9736==    by 0x430E76: doshfunc (exec.c:4920)
==9736==    by 0x4302FB: execshfunc (exec.c:4557)
==9736==    by 0x42D8C1: execcmd (exec.c:3373)
==9736== 
==9736== 
==9736== 2 errors in context 2 of 2:
==9736== Conditional jump or move depends on uninitialised value(s)
==9736==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9736==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9736==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9736==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9736==    by 0x42D8E9: execcmd (exec.c:3378)
==9736==    by 0x428CA0: execpline2 (exec.c:1697)
==9736==    by 0x427FD2: execpline (exec.c:1484)
==9736==    by 0x42779A: execlist (exec.c:1275)
==9736==    by 0x42717C: execode (exec.c:1073)
==9736==    by 0x431299: runshfunc (exec.c:5040)
==9736==    by 0x430E76: doshfunc (exec.c:4920)
==9736==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9736== 
==9736== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
==9743== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9743-by-pythonnut-on-???
==9743== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9743-by-pythonnut-on-???
==9743== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9743-by-pythonnut-on-???
==9743== 
==9743== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9743== don't want to do, unless you know exactly what you're doing,
==9743== or are doing some strange experiment):
==9743==   /usr/lib/valgrind/../../bin/vgdb --pid=9743 ...command...
==9743== 
==9743== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9743==   /path/to/gdb ./zsh
==9743== and then give GDB the following command
==9743==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9743
==9743== --pid is optional if only one valgrind process is running
==9743== 
==9744== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9744-by-pythonnut-on-???
==9744== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9744-by-pythonnut-on-???
==9744== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9744-by-pythonnut-on-???
==9744== 
==9744== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9744== don't want to do, unless you know exactly what you're doing,
==9744== or are doing some strange experiment):
==9744==   /usr/lib/valgrind/../../bin/vgdb --pid=9744 ...command...
==9744== 
==9744== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9744==   /path/to/gdb ./zsh
==9744== and then give GDB the following command
==9744==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9744
==9744== --pid is optional if only one valgrind process is running
==9744== 
--9744-- Caught __NR_exit; running __libc_freeres()
--9744-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9744== 
==9744== HEAP SUMMARY:
==9744==     in use at exit: 3,165,425 bytes in 69,620 blocks
==9744==   total heap usage: 1,468,351 allocs, 1,398,731 frees, 119,856,736 bytes allocated
==9744== 
==9744== Searching for pointers to 69,620 not-freed blocks
--9744--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9744--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9744--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9744--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9744--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9744--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9744--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9744--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9744--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9744--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9744--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9744--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9744--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9744--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9744--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9744--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9744--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9744--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9744--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9744--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9744--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9744--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9744--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9744--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9744--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9744--   Scanning root segment: 0x701a000..0x701afff (4096)
--9744--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9744--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9744--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9744--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9744--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9744--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9744--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9744--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9744--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9744== Checked 4,880,560 bytes
==9744== 
==9744== LEAK SUMMARY:
==9744==    definitely lost: 2,181 bytes in 11 blocks
==9744==    indirectly lost: 6,756 bytes in 7 blocks
==9744==      possibly lost: 0 bytes in 0 blocks
==9744==    still reachable: 3,156,488 bytes in 69,602 blocks
==9744==         suppressed: 0 bytes in 0 blocks
==9744== Rerun with --leak-check=full to see details of leaked memory
==9744== 
==9744== Use --track-origins=yes to see where uninitialised values come from
==9744== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9744== 
==9744== 1 errors in context 1 of 2:
==9744== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9744==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9744==    by 0x488CD0: stringsubst (subst.c:301)
==9744==    by 0x48801B: prefork (subst.c:77)
==9744==    by 0x42B318: execcmd (exec.c:2619)
==9744==    by 0x428CA0: execpline2 (exec.c:1697)
==9744==    by 0x427FD2: execpline (exec.c:1484)
==9744==    by 0x427756: execlist (exec.c:1267)
==9744==    by 0x42717C: execode (exec.c:1073)
==9744==    by 0x431299: runshfunc (exec.c:5040)
==9744==    by 0x430E76: doshfunc (exec.c:4920)
==9744==    by 0x4302FB: execshfunc (exec.c:4557)
==9744==    by 0x42D8C1: execcmd (exec.c:3373)
==9744== 
==9744== 
==9744== 2 errors in context 2 of 2:
==9744== Conditional jump or move depends on uninitialised value(s)
==9744==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9744==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9744==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9744==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9744==    by 0x42D8E9: execcmd (exec.c:3378)
==9744==    by 0x428CA0: execpline2 (exec.c:1697)
==9744==    by 0x427FD2: execpline (exec.c:1484)
==9744==    by 0x42779A: execlist (exec.c:1275)
==9744==    by 0x42717C: execode (exec.c:1073)
==9744==    by 0x431299: runshfunc (exec.c:5040)
==9744==    by 0x430E76: doshfunc (exec.c:4920)
==9744==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9744== 
==9744== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9743-- Caught __NR_exit; running __libc_freeres()
--9743-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9743== 
==9743== HEAP SUMMARY:
==9743==     in use at exit: 3,163,074 bytes in 69,540 blocks
==9743==   total heap usage: 1,468,291 allocs, 1,398,751 frees, 119,626,838 bytes allocated
==9743== 
==9743== Searching for pointers to 69,540 not-freed blocks
--9743--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9743--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9743--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9743--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9743--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9743--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9743--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9743--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9743--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9743--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9743--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9743--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9743--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9743--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9743--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9743--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9743--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9743--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9743--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9743--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9743--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9743--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9743--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9743--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9743--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9743--   Scanning root segment: 0x701a000..0x701afff (4096)
--9743--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9743--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9743--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9743--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9743--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9743--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9743--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9743--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9743--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9743== Checked 4,860,256 bytes
==9743== 
==9743== LEAK SUMMARY:
==9743==    definitely lost: 2,181 bytes in 11 blocks
==9743==    indirectly lost: 6,756 bytes in 7 blocks
==9743==      possibly lost: 0 bytes in 0 blocks
==9743==    still reachable: 3,154,137 bytes in 69,522 blocks
==9743==         suppressed: 0 bytes in 0 blocks
==9743== Rerun with --leak-check=full to see details of leaked memory
==9743== 
==9743== Use --track-origins=yes to see where uninitialised values come from
==9743== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9743== 
==9743== 1 errors in context 1 of 2:
==9743== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9743==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9743==    by 0x488CD0: stringsubst (subst.c:301)
==9743==    by 0x48801B: prefork (subst.c:77)
==9743==    by 0x42B318: execcmd (exec.c:2619)
==9743==    by 0x428CA0: execpline2 (exec.c:1697)
==9743==    by 0x427FD2: execpline (exec.c:1484)
==9743==    by 0x427756: execlist (exec.c:1267)
==9743==    by 0x42717C: execode (exec.c:1073)
==9743==    by 0x431299: runshfunc (exec.c:5040)
==9743==    by 0x430E76: doshfunc (exec.c:4920)
==9743==    by 0x4302FB: execshfunc (exec.c:4557)
==9743==    by 0x42D8C1: execcmd (exec.c:3373)
==9743== 
==9743== 
==9743== 2 errors in context 2 of 2:
==9743== Conditional jump or move depends on uninitialised value(s)
==9743==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9743==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9743==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9743==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9743==    by 0x42D8E9: execcmd (exec.c:3378)
==9743==    by 0x428CA0: execpline2 (exec.c:1697)
==9743==    by 0x427FD2: execpline (exec.c:1484)
==9743==    by 0x42779A: execlist (exec.c:1275)
==9743==    by 0x42717C: execode (exec.c:1073)
==9743==    by 0x431299: runshfunc (exec.c:5040)
==9743==    by 0x430E76: doshfunc (exec.c:4920)
==9743==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9743== 
==9743== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF616C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFEBCDC,  len 4
==9749== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9749-by-pythonnut-on-???
==9749== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9749-by-pythonnut-on-???
==9749== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9749-by-pythonnut-on-???
==9749== 
==9749== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9749== don't want to do, unless you know exactly what you're doing,
==9749== or are doing some strange experiment):
==9749==   /usr/lib/valgrind/../../bin/vgdb --pid=9749 ...command...
==9749== 
==9749== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9749==   /path/to/gdb ./zsh
==9749== and then give GDB the following command
==9749==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9749
==9749== --pid is optional if only one valgrind process is running
==9749== 
client request: code 4d430005,  addr 0xFFEFEAB9C,  len 4
==9748== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9748-by-pythonnut-on-???
==9748== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9748-by-pythonnut-on-???
==9748== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9748-by-pythonnut-on-???
==9748== 
==9748== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9748== don't want to do, unless you know exactly what you're doing,
==9748== or are doing some strange experiment):
==9748==   /usr/lib/valgrind/../../bin/vgdb --pid=9748 ...command...
==9748== 
==9748== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9748==   /path/to/gdb ./zsh
==9748== and then give GDB the following command
==9748==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9748
==9748== --pid is optional if only one valgrind process is running
==9748== 
--9748-- Caught __NR_exit; running __libc_freeres()
--9748-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9748== 
==9748== HEAP SUMMARY:
==9748==     in use at exit: 3,171,825 bytes in 69,629 blocks
==9748==   total heap usage: 1,468,617 allocs, 1,398,988 frees, 119,672,835 bytes allocated
==9748== 
==9748== Searching for pointers to 69,629 not-freed blocks
--9748--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9748--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9748--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9748--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9748--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9748--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9748--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9748--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9748--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9748--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9748--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9748--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9748--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9748--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9748--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9748--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9748--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9748--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9748--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9748--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9748--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9748--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9748--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9748--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9748--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9748--   Scanning root segment: 0x701a000..0x701afff (4096)
--9748--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9748--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9748--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9748--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9748--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9748--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9748--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9748--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9748--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9748== Checked 4,889,720 bytes
==9748== 
==9748== LEAK SUMMARY:
==9748==    definitely lost: 2,181 bytes in 11 blocks
==9748==    indirectly lost: 6,756 bytes in 7 blocks
==9748==      possibly lost: 0 bytes in 0 blocks
==9748==    still reachable: 3,162,888 bytes in 69,611 blocks
==9748==         suppressed: 0 bytes in 0 blocks
==9748== Rerun with --leak-check=full to see details of leaked memory
==9748== 
==9748== Use --track-origins=yes to see where uninitialised values come from
==9748== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9748== 
==9748== 1 errors in context 1 of 2:
==9748== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9748==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9748==    by 0x488CD0: stringsubst (subst.c:301)
==9748==    by 0x48801B: prefork (subst.c:77)
==9748==    by 0x42B318: execcmd (exec.c:2619)
==9748==    by 0x428CA0: execpline2 (exec.c:1697)
==9748==    by 0x427FD2: execpline (exec.c:1484)
==9748==    by 0x427756: execlist (exec.c:1267)
==9748==    by 0x42717C: execode (exec.c:1073)
==9748==    by 0x431299: runshfunc (exec.c:5040)
==9748==    by 0x430E76: doshfunc (exec.c:4920)
==9748==    by 0x4302FB: execshfunc (exec.c:4557)
==9748==    by 0x42D8C1: execcmd (exec.c:3373)
==9748== 
==9748== 
==9748== 2 errors in context 2 of 2:
==9748== Conditional jump or move depends on uninitialised value(s)
==9748==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9748==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9748==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9748==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9748==    by 0x42D8E9: execcmd (exec.c:3378)
==9748==    by 0x428CA0: execpline2 (exec.c:1697)
==9748==    by 0x427FD2: execpline (exec.c:1484)
==9748==    by 0x42779A: execlist (exec.c:1275)
==9748==    by 0x42717C: execode (exec.c:1073)
==9748==    by 0x431299: runshfunc (exec.c:5040)
==9748==    by 0x430E76: doshfunc (exec.c:4920)
==9748==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9748== 
==9748== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9751-- Caught __NR_exit; running __libc_freeres()
==9751== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9751-by-pythonnut-on-???
==9751== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9751-by-pythonnut-on-???
==9751== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9751-by-pythonnut-on-???
==9751== 
==9751== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9751== don't want to do, unless you know exactly what you're doing,
==9751== or are doing some strange experiment):
==9751==   /usr/lib/valgrind/../../bin/vgdb --pid=9751 ...command...
==9751== 
==9751== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9751==   /path/to/gdb ./zsh
==9751== and then give GDB the following command
==9751==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9751
==9751== --pid is optional if only one valgrind process is running
==9751== 
client request: code 4d430005,  addr 0xFFEFEA33C,  len 4
--9751-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9751== 
==9751== HEAP SUMMARY:
==9751==     in use at exit: 3,171,981 bytes in 69,635 blocks
==9751==   total heap usage: 1,468,626 allocs, 1,398,991 frees, 119,674,831 bytes allocated
==9751== 
==9751== Searching for pointers to 69,635 not-freed blocks
--9751--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9751--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9751--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9751--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9751--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9751--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9751--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9751--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9751--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9751--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9751--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9751--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9751--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9751--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9751--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9751--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9751--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9751--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9751--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9751--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9751--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9751--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9751--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9751--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9751--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9751--   Scanning root segment: 0x701a000..0x701afff (4096)
--9751--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9751--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9751--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9751--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9751--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9751--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9751--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9751--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9751--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9751== Checked 4,891,000 bytes
==9751== 
==9751== LEAK SUMMARY:
==9751==    definitely lost: 2,181 bytes in 11 blocks
==9751==    indirectly lost: 6,756 bytes in 7 blocks
==9751==      possibly lost: 0 bytes in 0 blocks
==9751==    still reachable: 3,163,044 bytes in 69,617 blocks
==9751==         suppressed: 0 bytes in 0 blocks
==9751== Rerun with --leak-check=full to see details of leaked memory
==9751== 
==9751== Use --track-origins=yes to see where uninitialised values come from
==9751== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9751== 
==9751== 1 errors in context 1 of 2:
==9751== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9751==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9751==    by 0x488CD0: stringsubst (subst.c:301)
==9751==    by 0x48801B: prefork (subst.c:77)
==9751==    by 0x42B318: execcmd (exec.c:2619)
==9751==    by 0x428CA0: execpline2 (exec.c:1697)
==9751==    by 0x427FD2: execpline (exec.c:1484)
==9751==    by 0x427756: execlist (exec.c:1267)
==9751==    by 0x42717C: execode (exec.c:1073)
==9751==    by 0x431299: runshfunc (exec.c:5040)
==9751==    by 0x430E76: doshfunc (exec.c:4920)
==9751==    by 0x4302FB: execshfunc (exec.c:4557)
==9751==    by 0x42D8C1: execcmd (exec.c:3373)
==9751== 
==9751== 
==9751== 2 errors in context 2 of 2:
==9751== Conditional jump or move depends on uninitialised value(s)
==9751==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9751==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9751==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9751==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9751==    by 0x42D8E9: execcmd (exec.c:3378)
==9751==    by 0x428CA0: execpline2 (exec.c:1697)
==9751==    by 0x427FD2: execpline (exec.c:1484)
==9751==    by 0x42779A: execlist (exec.c:1275)
==9751==    by 0x42717C: execode (exec.c:1073)
==9751==    by 0x431299: runshfunc (exec.c:5040)
==9751==    by 0x430E76: doshfunc (exec.c:4920)
==9751==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9751== 
==9751== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9750-- Caught __NR_exit; running __libc_freeres()
==9750== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9750-by-pythonnut-on-???
==9750== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9750-by-pythonnut-on-???
==9750== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9750-by-pythonnut-on-???
==9750== 
==9750== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9750== don't want to do, unless you know exactly what you're doing,
==9750== or are doing some strange experiment):
==9750==   /usr/lib/valgrind/../../bin/vgdb --pid=9750 ...command...
==9750== 
==9750== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9750==   /path/to/gdb ./zsh
==9750== and then give GDB the following command
==9750==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9750
==9750== --pid is optional if only one valgrind process is running
==9750== 
--9750-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9750== 
==9750== HEAP SUMMARY:
==9750==     in use at exit: 3,171,917 bytes in 69,632 blocks
==9750==   total heap usage: 1,468,628 allocs, 1,398,996 frees, 119,675,375 bytes allocated
==9750== 
==9750== Searching for pointers to 69,632 not-freed blocks
--9750--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9750--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9750--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9750--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9750--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9750--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9750--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9750--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9750--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9750--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9750--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9750--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9750--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9750--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9750--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9750--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9750--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9750--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9750--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9750--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9750--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9750--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9750--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9750--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9750--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9750--   Scanning root segment: 0x701a000..0x701afff (4096)
--9750--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9750--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9750--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9750--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9750--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9750--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9750--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9750--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9750--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9750== Checked 4,890,312 bytes
==9750== 
==9750== LEAK SUMMARY:
==9750==    definitely lost: 2,181 bytes in 11 blocks
==9750==    indirectly lost: 6,756 bytes in 7 blocks
==9750==      possibly lost: 0 bytes in 0 blocks
==9750==    still reachable: 3,162,980 bytes in 69,614 blocks
==9750==         suppressed: 0 bytes in 0 blocks
==9750== Rerun with --leak-check=full to see details of leaked memory
==9750== 
==9750== Use --track-origins=yes to see where uninitialised values come from
==9750== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9750== 
==9750== 1 errors in context 1 of 2:
==9750== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9750==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9750==    by 0x488CD0: stringsubst (subst.c:301)
==9750==    by 0x48801B: prefork (subst.c:77)
==9750==    by 0x42B318: execcmd (exec.c:2619)
==9750==    by 0x428CA0: execpline2 (exec.c:1697)
==9750==    by 0x427FD2: execpline (exec.c:1484)
==9750==    by 0x427756: execlist (exec.c:1267)
==9750==    by 0x42717C: execode (exec.c:1073)
==9750==    by 0x431299: runshfunc (exec.c:5040)
==9750==    by 0x430E76: doshfunc (exec.c:4920)
==9750==    by 0x4302FB: execshfunc (exec.c:4557)
==9750==    by 0x42D8C1: execcmd (exec.c:3373)
==9750== 
==9750== 
==9750== 2 errors in context 2 of 2:
==9750== Conditional jump or move depends on uninitialised value(s)
==9750==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9750==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9750==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9750==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9750==    by 0x42D8E9: execcmd (exec.c:3378)
==9750==    by 0x428CA0: execpline2 (exec.c:1697)
==9750==    by 0x427FD2: execpline (exec.c:1484)
==9750==    by 0x42779A: execlist (exec.c:1275)
==9750==    by 0x42717C: execode (exec.c:1073)
==9750==    by 0x431299: runshfunc (exec.c:5040)
==9750==    by 0x430E76: doshfunc (exec.c:4920)
==9750==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9750== 
==9750== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9753== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9753-by-pythonnut-on-???
==9753== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9753-by-pythonnut-on-???
==9753== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9753-by-pythonnut-on-???
==9753== 
==9753== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9753== don't want to do, unless you know exactly what you're doing,
==9753== or are doing some strange experiment):
==9753==   /usr/lib/valgrind/../../bin/vgdb --pid=9753 ...command...
==9753== 
==9753== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9753==   /path/to/gdb ./zsh
==9753== and then give GDB the following command
==9753==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9753
==9753== --pid is optional if only one valgrind process is running
==9753== 
--9754-- Caught __NR_exit; running __libc_freeres()
==9754== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9754-by-pythonnut-on-???
==9754== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9754-by-pythonnut-on-???
==9754== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9754-by-pythonnut-on-???
==9754== 
==9754== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9754== don't want to do, unless you know exactly what you're doing,
==9754== or are doing some strange experiment):
==9754==   /usr/lib/valgrind/../../bin/vgdb --pid=9754 ...command...
==9754== 
==9754== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9754==   /path/to/gdb ./zsh
==9754== and then give GDB the following command
==9754==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9754
==9754== --pid is optional if only one valgrind process is running
==9754== 
client request: code 4d430005,  addr 0xFFEFE9B7C,  len 4
--9754-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9754== 
==9754== HEAP SUMMARY:
==9754==     in use at exit: 3,172,078 bytes in 69,638 blocks
==9754==   total heap usage: 1,468,633 allocs, 1,398,995 frees, 119,677,040 bytes allocated
==9754== 
==9754== Searching for pointers to 69,638 not-freed blocks
--9754--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9754--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9754--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9754--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9754--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9754--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9754--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9754--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9754--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9754--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9754--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9754--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9754--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9754--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9754--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9754--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9754--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9754--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9754--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9754--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9754--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9754--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9754--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9754--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9754--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9754--   Scanning root segment: 0x701a000..0x701afff (4096)
--9754--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9754--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9754--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9754--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9754--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9754--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9754--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9754--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9754--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9754== Checked 4,891,600 bytes
==9754== 
==9754== LEAK SUMMARY:
==9754==    definitely lost: 2,181 bytes in 11 blocks
==9754==    indirectly lost: 6,756 bytes in 7 blocks
==9754==      possibly lost: 0 bytes in 0 blocks
==9754==    still reachable: 3,163,141 bytes in 69,620 blocks
==9754==         suppressed: 0 bytes in 0 blocks
==9754== Rerun with --leak-check=full to see details of leaked memory
==9754== 
==9754== Use --track-origins=yes to see where uninitialised values come from
==9754== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9754== 
==9754== 1 errors in context 1 of 2:
==9754== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9754==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9754==    by 0x488CD0: stringsubst (subst.c:301)
==9754==    by 0x48801B: prefork (subst.c:77)
==9754==    by 0x42B318: execcmd (exec.c:2619)
==9754==    by 0x428CA0: execpline2 (exec.c:1697)
==9754==    by 0x427FD2: execpline (exec.c:1484)
==9754==    by 0x427756: execlist (exec.c:1267)
==9754==    by 0x42717C: execode (exec.c:1073)
==9754==    by 0x431299: runshfunc (exec.c:5040)
==9754==    by 0x430E76: doshfunc (exec.c:4920)
==9754==    by 0x4302FB: execshfunc (exec.c:4557)
==9754==    by 0x42D8C1: execcmd (exec.c:3373)
==9754== 
==9754== 
==9754== 2 errors in context 2 of 2:
==9754== Conditional jump or move depends on uninitialised value(s)
==9754==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9754==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9754==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9754==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9754==    by 0x42D8E9: execcmd (exec.c:3378)
==9754==    by 0x428CA0: execpline2 (exec.c:1697)
==9754==    by 0x427FD2: execpline (exec.c:1484)
==9754==    by 0x42779A: execlist (exec.c:1275)
==9754==    by 0x42717C: execode (exec.c:1073)
==9754==    by 0x431299: runshfunc (exec.c:5040)
==9754==    by 0x430E76: doshfunc (exec.c:4920)
==9754==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9754== 
==9754== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9753-- Caught __NR_exit; running __libc_freeres()
--9753-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9753== 
==9753== HEAP SUMMARY:
==9753==     in use at exit: 3,172,014 bytes in 69,635 blocks
==9753==   total heap usage: 1,468,635 allocs, 1,399,000 frees, 119,677,584 bytes allocated
==9753== 
==9753== Searching for pointers to 69,635 not-freed blocks
--9753--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9753--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9753--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9753--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9753--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9753--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9753--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9753--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9753--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9753--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9753--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9753--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9753--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9753--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9753--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9753--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9753--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9753--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9753--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9753--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9753--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9753--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9753--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9753--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9753--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9753--   Scanning root segment: 0x701a000..0x701afff (4096)
--9753--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9753--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9753--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9753--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9753--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9753--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9753--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9753--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9753--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9753== Checked 4,890,920 bytes
==9753== 
==9753== LEAK SUMMARY:
==9753==    definitely lost: 2,181 bytes in 11 blocks
==9753==    indirectly lost: 6,756 bytes in 7 blocks
==9753==      possibly lost: 0 bytes in 0 blocks
==9753==    still reachable: 3,163,077 bytes in 69,617 blocks
==9753==         suppressed: 0 bytes in 0 blocks
==9753== Rerun with --leak-check=full to see details of leaked memory
==9753== 
==9753== Use --track-origins=yes to see where uninitialised values come from
==9753== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9753== 
==9753== 1 errors in context 1 of 2:
==9753== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9753==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9753==    by 0x488CD0: stringsubst (subst.c:301)
==9753==    by 0x48801B: prefork (subst.c:77)
==9753==    by 0x42B318: execcmd (exec.c:2619)
==9753==    by 0x428CA0: execpline2 (exec.c:1697)
==9753==    by 0x427FD2: execpline (exec.c:1484)
==9753==    by 0x427756: execlist (exec.c:1267)
==9753==    by 0x42717C: execode (exec.c:1073)
==9753==    by 0x431299: runshfunc (exec.c:5040)
==9753==    by 0x430E76: doshfunc (exec.c:4920)
==9753==    by 0x4302FB: execshfunc (exec.c:4557)
==9753==    by 0x42D8C1: execcmd (exec.c:3373)
==9753== 
==9753== 
==9753== 2 errors in context 2 of 2:
==9753== Conditional jump or move depends on uninitialised value(s)
==9753==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9753==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9753==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9753==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9753==    by 0x42D8E9: execcmd (exec.c:3378)
==9753==    by 0x428CA0: execpline2 (exec.c:1697)
==9753==    by 0x427FD2: execpline (exec.c:1484)
==9753==    by 0x42779A: execlist (exec.c:1275)
==9753==    by 0x42717C: execode (exec.c:1073)
==9753==    by 0x431299: runshfunc (exec.c:5040)
==9753==    by 0x430E76: doshfunc (exec.c:4920)
==9753==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9753== 
==9753== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF992C,  len 4
client request: code 4d430005,  addr 0xFFEFF87DC,  len 4
client request: code 4d430005,  addr 0xFFEFFB6EC,  len 4
--9723-- Caught __NR_exit; running __libc_freeres()
--9723-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9723== 
==9723== HEAP SUMMARY:
==9723==     in use at exit: 3,150,335 bytes in 69,153 blocks
==9723==   total heap usage: 1,468,723 allocs, 1,399,570 frees, 119,694,283 bytes allocated
==9723== 
==9723== Searching for pointers to 69,153 not-freed blocks
--9723--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9723--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9723--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9723--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9723--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9723--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9723--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9723--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9723--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9723--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9723--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9723--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9723--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9723--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9723--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9723--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9723--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9723--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9723--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9723--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9723--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9723--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9723--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9723--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9723--   Scanning root segment: 0x701a000..0x701afff (4096)
--9723--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9723--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9723--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9723--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9723--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9723--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9723--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9723--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9723--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
==9723== Checked 4,793,088 bytes
==9723== 
==9723== LEAK SUMMARY:
==9723==    definitely lost: 2,181 bytes in 11 blocks
==9723==    indirectly lost: 6,756 bytes in 7 blocks
==9723==      possibly lost: 0 bytes in 0 blocks
==9723==    still reachable: 3,141,398 bytes in 69,135 blocks
==9723==         suppressed: 0 bytes in 0 blocks
==9723== Rerun with --leak-check=full to see details of leaked memory
==9723== 
==9723== Use --track-origins=yes to see where uninitialised values come from
==9723== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9723== 
==9723== 1 errors in context 1 of 2:
==9723== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9723==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9723==    by 0x488CD0: stringsubst (subst.c:301)
==9723==    by 0x48801B: prefork (subst.c:77)
==9723==    by 0x42B318: execcmd (exec.c:2619)
==9723==    by 0x428CA0: execpline2 (exec.c:1697)
==9723==    by 0x427FD2: execpline (exec.c:1484)
==9723==    by 0x427756: execlist (exec.c:1267)
==9723==    by 0x42717C: execode (exec.c:1073)
==9723==    by 0x431299: runshfunc (exec.c:5040)
==9723==    by 0x430E76: doshfunc (exec.c:4920)
==9723==    by 0x4302FB: execshfunc (exec.c:4557)
==9723==    by 0x42D8C1: execcmd (exec.c:3373)
==9723== 
==9723== 
==9723== 2 errors in context 2 of 2:
==9723== Conditional jump or move depends on uninitialised value(s)
==9723==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9723==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9723==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9723==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9723==    by 0x42D8E9: execcmd (exec.c:3378)
==9723==    by 0x428CA0: execpline2 (exec.c:1697)
==9723==    by 0x427FD2: execpline (exec.c:1484)
==9723==    by 0x42779A: execlist (exec.c:1275)
==9723==    by 0x42717C: execode (exec.c:1073)
==9723==    by 0x431299: runshfunc (exec.c:5040)
==9723==    by 0x430E76: doshfunc (exec.c:4920)
==9723==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9723== 
==9723== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--7806-- memcheck GC: 1000 nodes, 929 survivors ( 92.9%)
--7806-- memcheck GC: 1414 new table size (stepup)
--9720-- Caught __NR_exit; running __libc_freeres()
--9720-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9720== 
==9720== HEAP SUMMARY:
==9720==     in use at exit: 3,120,310 bytes in 68,924 blocks
==9720==   total heap usage: 1,463,615 allocs, 1,394,691 frees, 117,961,236 bytes allocated
==9720== 
==9720== Searching for pointers to 68,924 not-freed blocks
--9720--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9720--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9720--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9720--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9720--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9720--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9720--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9720--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9720--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9720--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9720--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9720--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9720--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9720--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9720--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9720--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9720--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9720--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9720--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9720--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9720--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9720--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9720--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9720--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9720--   Scanning root segment: 0x701a000..0x701afff (4096)
--9720--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9720--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9720--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9720--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9720--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9720--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9720--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9720--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9720--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9758== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9758-by-pythonnut-on-???
==9758== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9758-by-pythonnut-on-???
==9758== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9758-by-pythonnut-on-???
==9758== 
==9758== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9758== don't want to do, unless you know exactly what you're doing,
==9758== or are doing some strange experiment):
==9758==   /usr/lib/valgrind/../../bin/vgdb --pid=9758 ...command...
==9758== 
==9758== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9758==   /path/to/gdb ./zsh
==9758== and then give GDB the following command
==9758==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9758
==9758== --pid is optional if only one valgrind process is running
==9758== 
--9759-- Caught __NR_exit; running __libc_freeres()
==9759== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9759-by-pythonnut-on-???
==9759== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9759-by-pythonnut-on-???
==9759== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9759-by-pythonnut-on-???
==9759== 
==9759== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9759== don't want to do, unless you know exactly what you're doing,
==9759== or are doing some strange experiment):
==9759==   /usr/lib/valgrind/../../bin/vgdb --pid=9759 ...command...
==9759== 
==9759== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9759==   /path/to/gdb ./zsh
==9759== and then give GDB the following command
==9759==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9759
==9759== --pid is optional if only one valgrind process is running
==9759== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--9759-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9759== 
==9759== HEAP SUMMARY:
==9759==     in use at exit: 3,124,574 bytes in 69,166 blocks
==9759==   total heap usage: 1,582,709 allocs, 1,513,543 frees, 127,430,363 bytes allocated
==9759== 
==9720== Checked 4,761,952 bytes
==9720== 
==9759== Searching for pointers to 69,166 not-freed blocks
--9759--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9759--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9759--   Scanning root segment: 0x4022000..0x4026fff (20480)
==9720== LEAK SUMMARY:
==9720==    definitely lost: 2,181 bytes in 11 blocks
==9720==    indirectly lost: 6,756 bytes in 7 blocks
==9720==      possibly lost: 0 bytes in 0 blocks
==9720==    still reachable: 3,111,373 bytes in 68,906 blocks
==9720==         suppressed: 0 bytes in 0 blocks
==9720== Rerun with --leak-check=full to see details of leaked memory
==9720== 
--9759--   Scanning root segment: 0x4049000..0x404cfff (16384)
==9720== Use --track-origins=yes to see where uninitialised values come from
==9720== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9720== 
==9720== 1 errors in context 1 of 2:
==9720== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9720==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9720==    by 0x488CD0: stringsubst (subst.c:301)
==9720==    by 0x48801B: prefork (subst.c:77)
==9720==    by 0x42B318: execcmd (exec.c:2619)
--9759--   Scanning root segment: 0x4222000..0x4222fff (4096)
==9720==    by 0x428CA0: execpline2 (exec.c:1697)
==9720==    by 0x427FD2: execpline (exec.c:1484)
==9720==    by 0x427756: execlist (exec.c:1267)
==9720==    by 0x42717C: execode (exec.c:1073)
--9759--   Scanning root segment: 0x4223000..0x4223fff (4096)
==9720==    by 0x431299: runshfunc (exec.c:5040)
==9720==    by 0x430E76: doshfunc (exec.c:4920)
==9720==    by 0x4302FB: execshfunc (exec.c:4557)
==9720==    by 0x42D8C1: execcmd (exec.c:3373)
==9720== 
--9759--   Scanning root segment: 0x4224000..0x4224fff (4096)
==9720== 
==9720== 2 errors in context 2 of 2:
==9720== Conditional jump or move depends on uninitialised value(s)
==9720==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
--9759--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
==9720==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9720==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9720==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9720==    by 0x42D8E9: execcmd (exec.c:3378)
--9759--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==9720==    by 0x428CA0: execpline2 (exec.c:1697)
==9720==    by 0x427FD2: execpline (exec.c:1484)
==9720==    by 0x42779A: execlist (exec.c:1275)
==9720==    by 0x42717C: execode (exec.c:1073)
==9720==    by 0x431299: runshfunc (exec.c:5040)
--9759--   Scanning root segment: 0x5041000..0x5041fff (4096)
==9720==    by 0x430E76: doshfunc (exec.c:4920)
==9720==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9720== 
==9720== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9759--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9759--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9759--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9759--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9759--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9759--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9759--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9759--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9759--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9759--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9759--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9759--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9759--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9759--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9759--   Scanning root segment: 0x701a000..0x701afff (4096)
--9759--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9759--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9759--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9759--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9759--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9759--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9759--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9759--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9759--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9759--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9649-- Caught __NR_exit; running __libc_freeres()
--9649-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9649== 
==9649== HEAP SUMMARY:
==9649==     in use at exit: 3,119,648 bytes in 68,911 blocks
==9649==   total heap usage: 1,463,655 allocs, 1,394,744 frees, 117,956,621 bytes allocated
==9649== 
==9649== Searching for pointers to 68,911 not-freed blocks
--9649--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9649--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9649--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9649--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9649--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9649--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9649--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9649--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9649--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9649--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9649--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9649--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9649--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9649--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9649--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9649--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9649--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9649--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9649--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9649--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9649--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9649--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9649--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9649--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9649--   Scanning root segment: 0x701a000..0x701afff (4096)
--9649--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9649--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9649--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9649--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9649--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9649--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9649--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9649--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9649--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9759== Checked 4,785,792 bytes
==9759== 
==9759== LEAK SUMMARY:
==9759==    definitely lost: 2,189 bytes in 12 blocks
==9759==    indirectly lost: 6,756 bytes in 7 blocks
==9759==      possibly lost: 0 bytes in 0 blocks
==9759==    still reachable: 3,115,629 bytes in 69,147 blocks
==9759==         suppressed: 0 bytes in 0 blocks
==9759== Rerun with --leak-check=full to see details of leaked memory
==9759== 
==9759== Use --track-origins=yes to see where uninitialised values come from
==9759== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9759== 
==9759== 1 errors in context 1 of 2:
==9759== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9759==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9759==    by 0x488CD0: stringsubst (subst.c:301)
==9759==    by 0x48801B: prefork (subst.c:77)
==9759==    by 0x42B318: execcmd (exec.c:2619)
==9759==    by 0x428CA0: execpline2 (exec.c:1697)
==9759==    by 0x427FD2: execpline (exec.c:1484)
==9759==    by 0x427756: execlist (exec.c:1267)
==9759==    by 0x42717C: execode (exec.c:1073)
==9759==    by 0x431299: runshfunc (exec.c:5040)
==9759==    by 0x430E76: doshfunc (exec.c:4920)
==9759==    by 0x4302FB: execshfunc (exec.c:4557)
==9759==    by 0x42D8C1: execcmd (exec.c:3373)
==9759== 
==9759== 
==9759== 2 errors in context 2 of 2:
==9759== Conditional jump or move depends on uninitialised value(s)
==9759==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9759==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9759==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9759==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9759==    by 0x42D8E9: execcmd (exec.c:3378)
==9759==    by 0x428CA0: execpline2 (exec.c:1697)
==9759==    by 0x427FD2: execpline (exec.c:1484)
==9759==    by 0x42779A: execlist (exec.c:1275)
==9759==    by 0x42717C: execode (exec.c:1073)
==9759==    by 0x431299: runshfunc (exec.c:5040)
==9759==    by 0x430E76: doshfunc (exec.c:4920)
==9759==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9759== 
==9759== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9758-- Caught __NR_exit; running __libc_freeres()
--9758-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9758== 
client request: code 4d430005,  addr 0xFFEFEBF0C,  len 4
==9758== HEAP SUMMARY:
==9758==     in use at exit: 3,124,510 bytes in 69,163 blocks
==9758==   total heap usage: 1,582,707 allocs, 1,513,544 frees, 127,430,122 bytes allocated
==9758== 
==9649== Checked 4,760,648 bytes
==9649== 
==9758== Searching for pointers to 69,163 not-freed blocks
--9758--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9758--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9758--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9758--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9758--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9758--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9758--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9758--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9758--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9758--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9758--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9758--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9758--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9758--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9758--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9758--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9758--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9758--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9758--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9758--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9758--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9758--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9758--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9758--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9758--   Scanning root segment: 0x701a000..0x701afff (4096)
--9758--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9758--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9758--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9758--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9758--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9758--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9758--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9758--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9758--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9758--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9649== LEAK SUMMARY:
==9649==    definitely lost: 2,181 bytes in 11 blocks
==9649==    indirectly lost: 6,756 bytes in 7 blocks
==9649==      possibly lost: 0 bytes in 0 blocks
==9649==    still reachable: 3,110,711 bytes in 68,893 blocks
==9649==         suppressed: 0 bytes in 0 blocks
==9649== Rerun with --leak-check=full to see details of leaked memory
==9649== 
==9649== Use --track-origins=yes to see where uninitialised values come from
==9649== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9649== 
==9649== 1 errors in context 1 of 2:
==9649== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9649==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9649==    by 0x488CD0: stringsubst (subst.c:301)
==9649==    by 0x48801B: prefork (subst.c:77)
==9649==    by 0x42B318: execcmd (exec.c:2619)
==9649==    by 0x428CA0: execpline2 (exec.c:1697)
==9649==    by 0x427FD2: execpline (exec.c:1484)
==9649==    by 0x427756: execlist (exec.c:1267)
==9649==    by 0x42717C: execode (exec.c:1073)
==9649==    by 0x431299: runshfunc (exec.c:5040)
==9649==    by 0x430E76: doshfunc (exec.c:4920)
==9649==    by 0x4302FB: execshfunc (exec.c:4557)
==9649==    by 0x42D8C1: execcmd (exec.c:3373)
==9649== 
==9649== 
==9649== 2 errors in context 2 of 2:
==9649== Conditional jump or move depends on uninitialised value(s)
==9649==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9649==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9649==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9649==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9649==    by 0x42D8E9: execcmd (exec.c:3378)
==9649==    by 0x428CA0: execpline2 (exec.c:1697)
==9649==    by 0x427FD2: execpline (exec.c:1484)
==9649==    by 0x42779A: execlist (exec.c:1275)
==9649==    by 0x42717C: execode (exec.c:1073)
==9649==    by 0x431299: runshfunc (exec.c:5040)
==9649==    by 0x430E76: doshfunc (exec.c:4920)
==9649==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9649== 
==9649== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9758== Checked 4,785,104 bytes
==9758== 
==9758== LEAK SUMMARY:
==9758==    definitely lost: 2,189 bytes in 12 blocks
==9758==    indirectly lost: 6,756 bytes in 7 blocks
==9758==      possibly lost: 0 bytes in 0 blocks
==9758==    still reachable: 3,115,565 bytes in 69,144 blocks
==9758==         suppressed: 0 bytes in 0 blocks
==9758== Rerun with --leak-check=full to see details of leaked memory
==9758== 
==9758== Use --track-origins=yes to see where uninitialised values come from
==9758== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9758== 
==9758== 1 errors in context 1 of 2:
==9758== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9758==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9758==    by 0x488CD0: stringsubst (subst.c:301)
==9758==    by 0x48801B: prefork (subst.c:77)
==9758==    by 0x42B318: execcmd (exec.c:2619)
==9758==    by 0x428CA0: execpline2 (exec.c:1697)
==9758==    by 0x427FD2: execpline (exec.c:1484)
==9758==    by 0x427756: execlist (exec.c:1267)
==9758==    by 0x42717C: execode (exec.c:1073)
==9758==    by 0x431299: runshfunc (exec.c:5040)
==9758==    by 0x430E76: doshfunc (exec.c:4920)
==9758==    by 0x4302FB: execshfunc (exec.c:4557)
==9758==    by 0x42D8C1: execcmd (exec.c:3373)
==9758== 
==9758== 
==9758== 2 errors in context 2 of 2:
==9758== Conditional jump or move depends on uninitialised value(s)
==9758==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9758==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9758==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9758==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9758==    by 0x42D8E9: execcmd (exec.c:3378)
==9758==    by 0x428CA0: execpline2 (exec.c:1697)
==9758==    by 0x427FD2: execpline (exec.c:1484)
==9758==    by 0x42779A: execlist (exec.c:1275)
==9758==    by 0x42717C: execode (exec.c:1073)
==9758==    by 0x431299: runshfunc (exec.c:5040)
==9758==    by 0x430E76: doshfunc (exec.c:4920)
==9758==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9758== 
==9758== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9762== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9762-by-pythonnut-on-???
==9762== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9762-by-pythonnut-on-???
==9762== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9762-by-pythonnut-on-???
==9762== 
==9762== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9762== don't want to do, unless you know exactly what you're doing,
==9762== or are doing some strange experiment):
==9762==   /usr/lib/valgrind/../../bin/vgdb --pid=9762 ...command...
==9762== 
==9762== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9762==   /path/to/gdb ./zsh
==9762== and then give GDB the following command
==9762==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9762
==9762== --pid is optional if only one valgrind process is running
==9762== 
--9762-- Caught __NR_exit; running __libc_freeres()
--9762-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9762== 
==9762== HEAP SUMMARY:
==9762==     in use at exit: 3,124,517 bytes in 69,163 blocks
==9762==   total heap usage: 1,583,166 allocs, 1,514,003 frees, 127,705,186 bytes allocated
==9762== 
==9762== Searching for pointers to 69,163 not-freed blocks
--9762--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9762--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9762--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9762--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9762--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9762--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9762--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9762--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9762--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9762--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9762--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9762--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9762--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9762--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9762--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9762--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9762--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9762--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9762--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9762--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9762--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9762--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9762--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9762--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9762--   Scanning root segment: 0x701a000..0x701afff (4096)
--9762--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9762--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9762--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9762--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9762--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9762--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9762--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9762--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9762--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9762--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9762== Checked 4,785,144 bytes
==9762== 
==9762== LEAK SUMMARY:
==9762==    definitely lost: 2,189 bytes in 12 blocks
==9762==    indirectly lost: 6,756 bytes in 7 blocks
==9762==      possibly lost: 0 bytes in 0 blocks
==9762==    still reachable: 3,115,572 bytes in 69,144 blocks
==9762==         suppressed: 0 bytes in 0 blocks
==9762== Rerun with --leak-check=full to see details of leaked memory
==9762== 
==9762== Use --track-origins=yes to see where uninitialised values come from
==9762== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9762== 
==9762== 1 errors in context 1 of 2:
==9762== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9762==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9762==    by 0x488CD0: stringsubst (subst.c:301)
==9762==    by 0x48801B: prefork (subst.c:77)
==9762==    by 0x42B318: execcmd (exec.c:2619)
==9762==    by 0x428CA0: execpline2 (exec.c:1697)
==9762==    by 0x427FD2: execpline (exec.c:1484)
==9762==    by 0x427756: execlist (exec.c:1267)
==9762==    by 0x42717C: execode (exec.c:1073)
==9762==    by 0x431299: runshfunc (exec.c:5040)
==9762==    by 0x430E76: doshfunc (exec.c:4920)
==9762==    by 0x4302FB: execshfunc (exec.c:4557)
==9762==    by 0x42D8C1: execcmd (exec.c:3373)
==9762== 
==9762== 
==9762== 2 errors in context 2 of 2:
==9762== Conditional jump or move depends on uninitialised value(s)
==9762==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9762==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9762==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9762==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9762==    by 0x42D8E9: execcmd (exec.c:3378)
==9762==    by 0x428CA0: execpline2 (exec.c:1697)
==9762==    by 0x427FD2: execpline (exec.c:1484)
==9762==    by 0x42779A: execlist (exec.c:1275)
==9762==    by 0x42717C: execode (exec.c:1073)
==9762==    by 0x431299: runshfunc (exec.c:5040)
==9762==    by 0x430E76: doshfunc (exec.c:4920)
==9762==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9762== 
==9762== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9763-- Caught __NR_exit; running __libc_freeres()
==9763== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9763-by-pythonnut-on-???
==9763== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9763-by-pythonnut-on-???
==9763== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9763-by-pythonnut-on-???
==9763== 
==9763== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9763== don't want to do, unless you know exactly what you're doing,
==9763== or are doing some strange experiment):
==9763==   /usr/lib/valgrind/../../bin/vgdb --pid=9763 ...command...
==9763== 
==9763== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9763==   /path/to/gdb ./zsh
==9763== and then give GDB the following command
==9763==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9763
==9763== --pid is optional if only one valgrind process is running
==9763== 
--9763-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9763== 
==9763== HEAP SUMMARY:
==9763==     in use at exit: 3,124,613 bytes in 69,163 blocks
==9763==   total heap usage: 1,583,182 allocs, 1,514,019 frees, 127,709,973 bytes allocated
==9763== 
==9763== Searching for pointers to 69,163 not-freed blocks
--9763--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9763--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9763--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9763--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9763--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9763--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9763--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9763--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9763--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9763--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9763--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9763--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9763--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9763--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9763--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9763--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9763--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9763--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9763--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9763--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9763--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9763--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9763--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9763--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9763--   Scanning root segment: 0x701a000..0x701afff (4096)
--9763--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9763--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9763--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9763--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9763--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9763--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9763--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9763--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9763--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9763--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9763== Checked 4,784,424 bytes
==9763== 
==9763== LEAK SUMMARY:
==9763==    definitely lost: 2,189 bytes in 12 blocks
==9763==    indirectly lost: 6,756 bytes in 7 blocks
==9763==      possibly lost: 0 bytes in 0 blocks
==9763==    still reachable: 3,115,668 bytes in 69,144 blocks
==9763==         suppressed: 0 bytes in 0 blocks
==9763== Rerun with --leak-check=full to see details of leaked memory
==9763== 
==9763== Use --track-origins=yes to see where uninitialised values come from
==9763== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9763== 
==9763== 1 errors in context 1 of 2:
==9763== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9763==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9763==    by 0x488CD0: stringsubst (subst.c:301)
==9763==    by 0x48801B: prefork (subst.c:77)
==9763==    by 0x42B318: execcmd (exec.c:2619)
==9763==    by 0x428CA0: execpline2 (exec.c:1697)
==9763==    by 0x427FD2: execpline (exec.c:1484)
==9763==    by 0x427756: execlist (exec.c:1267)
==9763==    by 0x42717C: execode (exec.c:1073)
==9763==    by 0x431299: runshfunc (exec.c:5040)
==9763==    by 0x430E76: doshfunc (exec.c:4920)
==9763==    by 0x4302FB: execshfunc (exec.c:4557)
==9763==    by 0x42D8C1: execcmd (exec.c:3373)
==9763== 
==9763== 
==9763== 2 errors in context 2 of 2:
==9763== Conditional jump or move depends on uninitialised value(s)
==9763==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9763==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9763==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9763==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9763==    by 0x42D8E9: execcmd (exec.c:3378)
==9763==    by 0x428CA0: execpline2 (exec.c:1697)
==9763==    by 0x427FD2: execpline (exec.c:1484)
==9763==    by 0x42779A: execlist (exec.c:1275)
==9763==    by 0x42717C: execode (exec.c:1073)
==9763==    by 0x431299: runshfunc (exec.c:5040)
==9763==    by 0x430E76: doshfunc (exec.c:4920)
==9763==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9763== 
==9763== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9766== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9766-by-pythonnut-on-???
==9766== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9766-by-pythonnut-on-???
==9766== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9766-by-pythonnut-on-???
==9766== 
==9766== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9766== don't want to do, unless you know exactly what you're doing,
==9766== or are doing some strange experiment):
==9766==   /usr/lib/valgrind/../../bin/vgdb --pid=9766 ...command...
==9766== 
==9766== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9766==   /path/to/gdb ./zsh
==9766== and then give GDB the following command
==9766==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9766
==9766== --pid is optional if only one valgrind process is running
==9766== 
--9766-- Caught __NR_exit; running __libc_freeres()
--9766-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9766== 
==9766== HEAP SUMMARY:
==9766==     in use at exit: 3,124,859 bytes in 69,169 blocks
==9766==   total heap usage: 1,583,230 allocs, 1,514,061 frees, 127,718,997 bytes allocated
==9766== 
==9766== Searching for pointers to 69,169 not-freed blocks
--9766--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9766--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9766--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9766--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9766--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9766--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9766--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9766--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9766--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9766--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9766--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9766--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9766--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9766--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9766--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9766--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9766--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9766--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9766--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9766--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9766--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9766--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9766--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9766--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9766--   Scanning root segment: 0x701a000..0x701afff (4096)
--9766--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9766--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9766--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9766--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9766--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9766--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9766--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9766--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9766--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9766--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9766== Checked 4,784,584 bytes
==9766== 
==9766== LEAK SUMMARY:
==9766==    definitely lost: 2,189 bytes in 12 blocks
==9766==    indirectly lost: 6,756 bytes in 7 blocks
==9766==      possibly lost: 0 bytes in 0 blocks
==9766==    still reachable: 3,115,914 bytes in 69,150 blocks
==9766==         suppressed: 0 bytes in 0 blocks
==9766== Rerun with --leak-check=full to see details of leaked memory
==9766== 
==9766== Use --track-origins=yes to see where uninitialised values come from
==9766== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9766== 
==9766== 1 errors in context 1 of 2:
==9766== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9766==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9766==    by 0x488CD0: stringsubst (subst.c:301)
==9766==    by 0x48801B: prefork (subst.c:77)
==9766==    by 0x42B318: execcmd (exec.c:2619)
==9766==    by 0x428CA0: execpline2 (exec.c:1697)
==9766==    by 0x427FD2: execpline (exec.c:1484)
==9766==    by 0x427756: execlist (exec.c:1267)
==9766==    by 0x42717C: execode (exec.c:1073)
==9766==    by 0x431299: runshfunc (exec.c:5040)
==9766==    by 0x430E76: doshfunc (exec.c:4920)
==9766==    by 0x4302FB: execshfunc (exec.c:4557)
==9766==    by 0x42D8C1: execcmd (exec.c:3373)
==9766== 
==9766== 
==9766== 2 errors in context 2 of 2:
==9766== Conditional jump or move depends on uninitialised value(s)
==9766==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9766==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9766==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9766==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9766==    by 0x42D8E9: execcmd (exec.c:3378)
==9766==    by 0x428CA0: execpline2 (exec.c:1697)
==9766==    by 0x427FD2: execpline (exec.c:1484)
==9766==    by 0x42779A: execlist (exec.c:1275)
==9766==    by 0x42717C: execode (exec.c:1073)
==9766==    by 0x431299: runshfunc (exec.c:5040)
==9766==    by 0x430E76: doshfunc (exec.c:4920)
==9766==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9766== 
==9766== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9767-- Caught __NR_exit; running __libc_freeres()
==9767== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9767-by-pythonnut-on-???
==9767== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9767-by-pythonnut-on-???
==9767== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9767-by-pythonnut-on-???
==9767== 
==9767== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9767== don't want to do, unless you know exactly what you're doing,
==9767== or are doing some strange experiment):
==9767==   /usr/lib/valgrind/../../bin/vgdb --pid=9767 ...command...
==9767== 
==9767== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9767==   /path/to/gdb ./zsh
==9767== and then give GDB the following command
==9767==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9767
==9767== --pid is optional if only one valgrind process is running
==9767== 
--9767-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9767== 
==9767== HEAP SUMMARY:
==9767==     in use at exit: 3,124,795 bytes in 69,169 blocks
==9767==   total heap usage: 1,583,210 allocs, 1,514,041 frees, 127,716,767 bytes allocated
==9767== 
==9767== Searching for pointers to 69,169 not-freed blocks
--9767--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9767--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9767--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9767--   Scanning root segment: 0x4037000..0x403afff (16384)
--9767--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9767--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9767--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9767--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9767--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9767--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9767--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9767--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9767--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9767--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9767--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9767--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9767--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9767--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9767--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9767--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9767--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9767--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9767--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9767--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9767--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9767--   Scanning root segment: 0x701a000..0x701afff (4096)
--9767--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9767--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9767--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9767--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9767--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9767--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9767--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9767--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9767--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9767--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9767== Checked 4,800,904 bytes
==9767== 
==9767== LEAK SUMMARY:
==9767==    definitely lost: 2,189 bytes in 12 blocks
==9767==    indirectly lost: 6,756 bytes in 7 blocks
==9767==      possibly lost: 0 bytes in 0 blocks
==9767==    still reachable: 3,115,850 bytes in 69,150 blocks
==9767==         suppressed: 0 bytes in 0 blocks
==9767== Rerun with --leak-check=full to see details of leaked memory
==9767== 
==9767== Use --track-origins=yes to see where uninitialised values come from
==9767== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9767== 
==9767== 1 errors in context 1 of 2:
==9767== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9767==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9767==    by 0x488CD0: stringsubst (subst.c:301)
==9767==    by 0x48801B: prefork (subst.c:77)
==9767==    by 0x42B318: execcmd (exec.c:2619)
==9767==    by 0x428CA0: execpline2 (exec.c:1697)
==9767==    by 0x427FD2: execpline (exec.c:1484)
==9767==    by 0x427756: execlist (exec.c:1267)
==9767==    by 0x42717C: execode (exec.c:1073)
==9767==    by 0x431299: runshfunc (exec.c:5040)
==9767==    by 0x430E76: doshfunc (exec.c:4920)
==9767==    by 0x4302FB: execshfunc (exec.c:4557)
==9767==    by 0x42D8C1: execcmd (exec.c:3373)
==9767== 
==9767== 
==9767== 2 errors in context 2 of 2:
==9767== Conditional jump or move depends on uninitialised value(s)
==9767==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9767==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9767==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9767==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9767==    by 0x42D8E9: execcmd (exec.c:3378)
==9767==    by 0x428CA0: execpline2 (exec.c:1697)
==9767==    by 0x427FD2: execpline (exec.c:1484)
==9767==    by 0x42779A: execlist (exec.c:1275)
==9767==    by 0x42717C: execode (exec.c:1073)
==9767==    by 0x431299: runshfunc (exec.c:5040)
==9767==    by 0x430E76: doshfunc (exec.c:4920)
==9767==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9767== 
==9767== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9769== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9769-by-pythonnut-on-???
==9769== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9769-by-pythonnut-on-???
==9769== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9769-by-pythonnut-on-???
==9769== 
==9769== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9769== don't want to do, unless you know exactly what you're doing,
==9769== or are doing some strange experiment):
==9769==   /usr/lib/valgrind/../../bin/vgdb --pid=9769 ...command...
==9769== 
==9769== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9769==   /path/to/gdb ./zsh
==9769== and then give GDB the following command
==9769==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9769
==9769== --pid is optional if only one valgrind process is running
==9769== 
--9769-- Caught __NR_exit; running __libc_freeres()
--9769-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9769== 
==9769== HEAP SUMMARY:
==9769==     in use at exit: 3,124,833 bytes in 69,170 blocks
==9769==   total heap usage: 1,583,223 allocs, 1,514,053 frees, 127,719,464 bytes allocated
==9769== 
==9769== Searching for pointers to 69,170 not-freed blocks
--9769--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9769--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9769--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9769--   Scanning root segment: 0x4037000..0x403afff (16384)
--9769--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9769--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9769--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9769--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9769--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9769--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9769--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9769--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9769--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9769--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9769--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9769--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9769--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9769--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9769--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9769--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9769--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9769--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9769--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9769--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9769--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9769--   Scanning root segment: 0x701a000..0x701afff (4096)
--9769--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9769--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9769--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9769--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9769--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9769--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9769--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9769--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9769--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9769--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9769== Checked 4,800,424 bytes
==9769== 
==9769== LEAK SUMMARY:
==9769==    definitely lost: 2,189 bytes in 12 blocks
==9769==    indirectly lost: 6,756 bytes in 7 blocks
==9769==      possibly lost: 0 bytes in 0 blocks
==9769==    still reachable: 3,115,888 bytes in 69,151 blocks
==9769==         suppressed: 0 bytes in 0 blocks
==9769== Rerun with --leak-check=full to see details of leaked memory
==9769== 
==9769== Use --track-origins=yes to see where uninitialised values come from
==9769== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9769== 
==9769== 1 errors in context 1 of 2:
==9769== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9769==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9769==    by 0x488CD0: stringsubst (subst.c:301)
==9769==    by 0x48801B: prefork (subst.c:77)
==9769==    by 0x42B318: execcmd (exec.c:2619)
==9769==    by 0x428CA0: execpline2 (exec.c:1697)
==9769==    by 0x427FD2: execpline (exec.c:1484)
==9769==    by 0x427756: execlist (exec.c:1267)
==9769==    by 0x42717C: execode (exec.c:1073)
==9769==    by 0x431299: runshfunc (exec.c:5040)
==9769==    by 0x430E76: doshfunc (exec.c:4920)
==9769==    by 0x4302FB: execshfunc (exec.c:4557)
==9769==    by 0x42D8C1: execcmd (exec.c:3373)
==9769== 
==9769== 
==9769== 2 errors in context 2 of 2:
==9769== Conditional jump or move depends on uninitialised value(s)
==9769==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9769==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9769==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9769==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9769==    by 0x42D8E9: execcmd (exec.c:3378)
==9769==    by 0x428CA0: execpline2 (exec.c:1697)
==9769==    by 0x427FD2: execpline (exec.c:1484)
==9769==    by 0x42779A: execlist (exec.c:1275)
==9769==    by 0x42717C: execode (exec.c:1073)
==9769==    by 0x431299: runshfunc (exec.c:5040)
==9769==    by 0x430E76: doshfunc (exec.c:4920)
==9769==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9769== 
==9769== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9770== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9770-by-pythonnut-on-???
==9770== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9770-by-pythonnut-on-???
==9770== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9770-by-pythonnut-on-???
==9770== 
==9770== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9770== don't want to do, unless you know exactly what you're doing,
==9770== or are doing some strange experiment):
==9770==   /usr/lib/valgrind/../../bin/vgdb --pid=9770 ...command...
==9770== 
==9770== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9770==   /path/to/gdb ./zsh
==9770== and then give GDB the following command
==9770==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9770
==9770== --pid is optional if only one valgrind process is running
==9770== 
--9770-- Caught __NR_exit; running __libc_freeres()
--9770-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9770== 
==9770== HEAP SUMMARY:
==9770==     in use at exit: 3,124,052 bytes in 69,171 blocks
==9770==   total heap usage: 1,584,533 allocs, 1,515,362 frees, 127,789,264 bytes allocated
==9770== 
==9770== Searching for pointers to 69,171 not-freed blocks
--9770--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9770--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9770--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9770--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9770--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9770--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9770--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9770--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9770--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9770--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9770--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9770--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9770--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9770--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9770--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9770--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9770--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9770--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9770--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9770--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9770--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9770--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9770--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9770--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9770--   Scanning root segment: 0x701a000..0x701afff (4096)
--9770--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9770--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9770--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9770--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9770--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9770--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9770--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9770--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9770--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9770--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9770== Checked 4,785,920 bytes
==9770== 
==9770== LEAK SUMMARY:
==9770==    definitely lost: 2,189 bytes in 12 blocks
==9770==    indirectly lost: 6,756 bytes in 7 blocks
==9770==      possibly lost: 0 bytes in 0 blocks
==9770==    still reachable: 3,115,107 bytes in 69,152 blocks
==9770==         suppressed: 0 bytes in 0 blocks
==9770== Rerun with --leak-check=full to see details of leaked memory
==9770== 
==9770== Use --track-origins=yes to see where uninitialised values come from
==9770== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9770== 
==9770== 1 errors in context 1 of 2:
==9770== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9770==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9770==    by 0x488CD0: stringsubst (subst.c:301)
==9770==    by 0x48801B: prefork (subst.c:77)
==9770==    by 0x42B318: execcmd (exec.c:2619)
==9770==    by 0x428CA0: execpline2 (exec.c:1697)
==9770==    by 0x427FD2: execpline (exec.c:1484)
==9770==    by 0x427756: execlist (exec.c:1267)
==9770==    by 0x42717C: execode (exec.c:1073)
==9770==    by 0x431299: runshfunc (exec.c:5040)
==9770==    by 0x430E76: doshfunc (exec.c:4920)
==9770==    by 0x4302FB: execshfunc (exec.c:4557)
==9770==    by 0x42D8C1: execcmd (exec.c:3373)
==9770== 
==9770== 
==9770== 2 errors in context 2 of 2:
==9770== Conditional jump or move depends on uninitialised value(s)
==9770==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9770==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9770==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9770==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9770==    by 0x42D8E9: execcmd (exec.c:3378)
==9770==    by 0x428CA0: execpline2 (exec.c:1697)
==9770==    by 0x427FD2: execpline (exec.c:1484)
==9770==    by 0x42779A: execlist (exec.c:1275)
==9770==    by 0x42717C: execode (exec.c:1073)
==9770==    by 0x431299: runshfunc (exec.c:5040)
==9770==    by 0x430E76: doshfunc (exec.c:4920)
==9770==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9770== 
==9770== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9771-- Caught __NR_exit; running __libc_freeres()
==9771== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9771-by-pythonnut-on-???
==9771== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9771-by-pythonnut-on-???
==9771== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9771-by-pythonnut-on-???
==9771== 
==9771== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9771== don't want to do, unless you know exactly what you're doing,
==9771== or are doing some strange experiment):
==9771==   /usr/lib/valgrind/../../bin/vgdb --pid=9771 ...command...
==9771== 
==9771== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9771==   /path/to/gdb ./zsh
==9771== and then give GDB the following command
==9771==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9771
==9771== --pid is optional if only one valgrind process is running
==9771== 
--9771-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9771== 
==9771== HEAP SUMMARY:
==9771==     in use at exit: 3,124,116 bytes in 69,171 blocks
==9771==   total heap usage: 1,584,539 allocs, 1,515,368 frees, 127,797,840 bytes allocated
==9771== 
==9771== Searching for pointers to 69,171 not-freed blocks
--9771--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9771--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9771--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9771--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9771--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9771--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9771--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9771--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9771--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9771--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9771--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9771--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9771--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9771--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9771--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9771--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9771--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9771--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9771--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9771--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9771--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9771--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9771--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9771--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9771--   Scanning root segment: 0x701a000..0x701afff (4096)
--9771--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9771--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9771--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9771--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9771--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9771--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9771--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9771--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9771--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9771--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9771== Checked 4,788,016 bytes
==9771== 
==9771== LEAK SUMMARY:
==9771==    definitely lost: 2,189 bytes in 12 blocks
==9771==    indirectly lost: 6,756 bytes in 7 blocks
==9771==      possibly lost: 0 bytes in 0 blocks
==9771==    still reachable: 3,115,171 bytes in 69,152 blocks
==9771==         suppressed: 0 bytes in 0 blocks
==9771== Rerun with --leak-check=full to see details of leaked memory
==9771== 
==9771== Use --track-origins=yes to see where uninitialised values come from
==9771== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9771== 
==9771== 1 errors in context 1 of 2:
==9771== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9771==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9771==    by 0x488CD0: stringsubst (subst.c:301)
==9771==    by 0x48801B: prefork (subst.c:77)
==9771==    by 0x42B318: execcmd (exec.c:2619)
==9771==    by 0x428CA0: execpline2 (exec.c:1697)
==9771==    by 0x427FD2: execpline (exec.c:1484)
==9771==    by 0x427756: execlist (exec.c:1267)
==9771==    by 0x42717C: execode (exec.c:1073)
==9771==    by 0x431299: runshfunc (exec.c:5040)
==9771==    by 0x430E76: doshfunc (exec.c:4920)
==9771==    by 0x4302FB: execshfunc (exec.c:4557)
==9771==    by 0x42D8C1: execcmd (exec.c:3373)
==9771== 
==9771== 
==9771== 2 errors in context 2 of 2:
==9771== Conditional jump or move depends on uninitialised value(s)
==9771==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9771==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9771==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9771==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9771==    by 0x42D8E9: execcmd (exec.c:3378)
==9771==    by 0x428CA0: execpline2 (exec.c:1697)
==9771==    by 0x427FD2: execpline (exec.c:1484)
==9771==    by 0x42779A: execlist (exec.c:1275)
==9771==    by 0x42717C: execode (exec.c:1073)
==9771==    by 0x431299: runshfunc (exec.c:5040)
==9771==    by 0x430E76: doshfunc (exec.c:4920)
==9771==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9771== 
==9771== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9772== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9772-by-pythonnut-on-???
==9772== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9772-by-pythonnut-on-???
==9772== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9772-by-pythonnut-on-???
==9772== 
==9772== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9772== don't want to do, unless you know exactly what you're doing,
==9772== or are doing some strange experiment):
==9772==   /usr/lib/valgrind/../../bin/vgdb --pid=9772 ...command...
==9772== 
==9772== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9772==   /path/to/gdb ./zsh
==9772== and then give GDB the following command
==9772==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9772
==9772== --pid is optional if only one valgrind process is running
==9772== 
==9773== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9773-by-pythonnut-on-???
==9773== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9773-by-pythonnut-on-???
==9773== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9773-by-pythonnut-on-???
==9773== 
==9773== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9773== don't want to do, unless you know exactly what you're doing,
==9773== or are doing some strange experiment):
==9773==   /usr/lib/valgrind/../../bin/vgdb --pid=9773 ...command...
==9773== 
==9773== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9773==   /path/to/gdb ./zsh
==9773== and then give GDB the following command
==9773==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9773
==9773== --pid is optional if only one valgrind process is running
==9773== 
==9776== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9776-by-pythonnut-on-???
==9776== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9776-by-pythonnut-on-???
==9776== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9776-by-pythonnut-on-???
==9776== 
==9776== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9776== don't want to do, unless you know exactly what you're doing,
==9776== or are doing some strange experiment):
==9776==   /usr/lib/valgrind/../../bin/vgdb --pid=9776 ...command...
==9776== 
==9776== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9776==   /path/to/gdb ./zsh
==9776== and then give GDB the following command
==9776==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9776
==9776== --pid is optional if only one valgrind process is running
==9776== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--9776-- Caught __NR_exit; running __libc_freeres()
--9776-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9776== 
==9776== HEAP SUMMARY:
==9776==     in use at exit: 3,127,929 bytes in 69,238 blocks
==9776==   total heap usage: 1,584,700 allocs, 1,515,462 frees, 127,827,154 bytes allocated
==9776== 
==9776== Searching for pointers to 69,238 not-freed blocks
--9776--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9776--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9776--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9776--   Scanning root segment: 0x4037000..0x403afff (16384)
--9776--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9776--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9776--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9776--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9776--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9776--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9776--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9776--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9776--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9776--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9776--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9776--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9776--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9776--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9776--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9776--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9776--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9776--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9776--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9776--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9776--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9776--   Scanning root segment: 0x701a000..0x701afff (4096)
--9776--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9776--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9776--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9776--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9776--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9776--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9776--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9776--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9776--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9776--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9776== Checked 4,810,576 bytes
==9776== 
==9776== LEAK SUMMARY:
==9776==    definitely lost: 2,189 bytes in 12 blocks
==9776==    indirectly lost: 6,756 bytes in 7 blocks
==9776==      possibly lost: 0 bytes in 0 blocks
==9776==    still reachable: 3,118,984 bytes in 69,219 blocks
==9776==         suppressed: 0 bytes in 0 blocks
==9776== Rerun with --leak-check=full to see details of leaked memory
==9776== 
==9776== Use --track-origins=yes to see where uninitialised values come from
==9776== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9776== 
==9776== 1 errors in context 1 of 2:
==9776== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9776==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9776==    by 0x488CD0: stringsubst (subst.c:301)
==9776==    by 0x48801B: prefork (subst.c:77)
==9776==    by 0x42B318: execcmd (exec.c:2619)
==9776==    by 0x428CA0: execpline2 (exec.c:1697)
==9776==    by 0x427FD2: execpline (exec.c:1484)
==9776==    by 0x427756: execlist (exec.c:1267)
==9776==    by 0x42717C: execode (exec.c:1073)
==9776==    by 0x431299: runshfunc (exec.c:5040)
==9776==    by 0x430E76: doshfunc (exec.c:4920)
==9776==    by 0x4302FB: execshfunc (exec.c:4557)
==9776==    by 0x42D8C1: execcmd (exec.c:3373)
==9776== 
==9776== 
==9776== 2 errors in context 2 of 2:
==9776== Conditional jump or move depends on uninitialised value(s)
==9776==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9776==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9776==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9776==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9776==    by 0x42D8E9: execcmd (exec.c:3378)
==9776==    by 0x428CA0: execpline2 (exec.c:1697)
==9776==    by 0x427FD2: execpline (exec.c:1484)
==9776==    by 0x42779A: execlist (exec.c:1275)
==9776==    by 0x42717C: execode (exec.c:1073)
==9776==    by 0x431299: runshfunc (exec.c:5040)
==9776==    by 0x430E76: doshfunc (exec.c:4920)
==9776==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9776== 
==9776== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9779-- Caught __NR_exit; running __libc_freeres()
==9779== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9779-by-pythonnut-on-???
==9779== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9779-by-pythonnut-on-???
==9779== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9779-by-pythonnut-on-???
==9779== 
==9779== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9779== don't want to do, unless you know exactly what you're doing,
==9779== or are doing some strange experiment):
==9779==   /usr/lib/valgrind/../../bin/vgdb --pid=9779 ...command...
==9779== 
==9779== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9779==   /path/to/gdb ./zsh
==9779== and then give GDB the following command
==9779==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9779
==9779== --pid is optional if only one valgrind process is running
==9779== 
==9780== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9780-by-pythonnut-on-???
==9780== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9780-by-pythonnut-on-???
==9780== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9780-by-pythonnut-on-???
==9780== 
==9780== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9780== don't want to do, unless you know exactly what you're doing,
==9780== or are doing some strange experiment):
==9780==   /usr/lib/valgrind/../../bin/vgdb --pid=9780 ...command...
==9780== 
==9780== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9780==   /path/to/gdb ./zsh
==9780== and then give GDB the following command
==9780==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9780
==9780== --pid is optional if only one valgrind process is running
==9780== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9779-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9779== 
==9779== HEAP SUMMARY:
==9779==     in use at exit: 3,164,796 bytes in 69,245 blocks
==9779==   total heap usage: 1,584,707 allocs, 1,515,462 frees, 127,867,077 bytes allocated
==9779== 
==9779== Searching for pointers to 69,245 not-freed blocks
--9779--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9779--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9779--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9779--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9779--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9779--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9779--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9779--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9779--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9779--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9779--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9779--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9779--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9779--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9779--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9779--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9779--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9779--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9779--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9779--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9779--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9779--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9779--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9779--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9779--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9779--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9779--   Scanning root segment: 0x701a000..0x701afff (4096)
--9779--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9779--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9779--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9779--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9779--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9779--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9779--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9779--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9779--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9779--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9779== Checked 4,922,392 bytes
==9779== 
==9779== LEAK SUMMARY:
==9779==    definitely lost: 2,189 bytes in 12 blocks
==9779==    indirectly lost: 6,756 bytes in 7 blocks
==9779==      possibly lost: 0 bytes in 0 blocks
==9779==    still reachable: 3,155,851 bytes in 69,226 blocks
==9779==         suppressed: 0 bytes in 0 blocks
==9779== Rerun with --leak-check=full to see details of leaked memory
==9779== 
==9779== Use --track-origins=yes to see where uninitialised values come from
==9779== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9779== 
==9779== 1 errors in context 1 of 2:
==9779== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9779==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9779==    by 0x488CD0: stringsubst (subst.c:301)
==9779==    by 0x48801B: prefork (subst.c:77)
==9779==    by 0x42B318: execcmd (exec.c:2619)
==9779==    by 0x428CA0: execpline2 (exec.c:1697)
==9779==    by 0x427FD2: execpline (exec.c:1484)
==9779==    by 0x427756: execlist (exec.c:1267)
==9779==    by 0x42717C: execode (exec.c:1073)
==9779==    by 0x431299: runshfunc (exec.c:5040)
==9779==    by 0x430E76: doshfunc (exec.c:4920)
==9779==    by 0x4302FB: execshfunc (exec.c:4557)
==9779==    by 0x42D8C1: execcmd (exec.c:3373)
==9779== 
==9779== 
==9779== 2 errors in context 2 of 2:
==9779== Conditional jump or move depends on uninitialised value(s)
==9779==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9779==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9779==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9779==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9779==    by 0x42D8E9: execcmd (exec.c:3378)
==9779==    by 0x428CA0: execpline2 (exec.c:1697)
==9779==    by 0x427FD2: execpline (exec.c:1484)
==9779==    by 0x42779A: execlist (exec.c:1275)
==9779==    by 0x42717C: execode (exec.c:1073)
==9779==    by 0x431299: runshfunc (exec.c:5040)
==9779==    by 0x430E76: doshfunc (exec.c:4920)
==9779==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9779== 
==9779== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9778== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9778-by-pythonnut-on-???
==9778== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9778-by-pythonnut-on-???
==9778== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9778-by-pythonnut-on-???
==9778== 
==9778== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9778== don't want to do, unless you know exactly what you're doing,
==9778== or are doing some strange experiment):
==9778==   /usr/lib/valgrind/../../bin/vgdb --pid=9778 ...command...
==9778== 
==9778== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9778==   /path/to/gdb ./zsh
==9778== and then give GDB the following command
==9778==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9778
==9778== --pid is optional if only one valgrind process is running
==9778== 
--9778-- Caught __NR_exit; running __libc_freeres()
--9778-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9778== 
==9778== HEAP SUMMARY:
==9778==     in use at exit: 3,164,764 bytes in 69,242 blocks
==9778==   total heap usage: 1,584,710 allocs, 1,515,468 frees, 127,867,685 bytes allocated
==9778== 
==9778== Searching for pointers to 69,242 not-freed blocks
--9778--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9778--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9778--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9778--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9778--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9778--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9778--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9778--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9778--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9778--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9778--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9778--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9778--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9778--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9778--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9778--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9778--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9778--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9778--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9778--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9778--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9778--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9778--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9778--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9778--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9778--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9778--   Scanning root segment: 0x701a000..0x701afff (4096)
--9778--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9778--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9778--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9778--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9778--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9778--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9778--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9778--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9778--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9778--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9778== Checked 4,921,720 bytes
==9778== 
==9778== LEAK SUMMARY:
==9778==    definitely lost: 2,189 bytes in 12 blocks
==9778==    indirectly lost: 6,756 bytes in 7 blocks
==9778==      possibly lost: 0 bytes in 0 blocks
==9778==    still reachable: 3,155,819 bytes in 69,223 blocks
==9778==         suppressed: 0 bytes in 0 blocks
==9778== Rerun with --leak-check=full to see details of leaked memory
==9778== 
==9778== Use --track-origins=yes to see where uninitialised values come from
==9778== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9778== 
==9778== 1 errors in context 1 of 2:
==9778== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9778==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9778==    by 0x488CD0: stringsubst (subst.c:301)
==9778==    by 0x48801B: prefork (subst.c:77)
==9778==    by 0x42B318: execcmd (exec.c:2619)
==9778==    by 0x428CA0: execpline2 (exec.c:1697)
==9778==    by 0x427FD2: execpline (exec.c:1484)
==9778==    by 0x427756: execlist (exec.c:1267)
==9778==    by 0x42717C: execode (exec.c:1073)
==9778==    by 0x431299: runshfunc (exec.c:5040)
==9778==    by 0x430E76: doshfunc (exec.c:4920)
==9778==    by 0x4302FB: execshfunc (exec.c:4557)
==9778==    by 0x42D8C1: execcmd (exec.c:3373)
==9778== 
==9778== 
==9778== 2 errors in context 2 of 2:
==9778== Conditional jump or move depends on uninitialised value(s)
==9778==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9778==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9778==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9778==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9778==    by 0x42D8E9: execcmd (exec.c:3378)
==9778==    by 0x428CA0: execpline2 (exec.c:1697)
==9778==    by 0x427FD2: execpline (exec.c:1484)
==9778==    by 0x42779A: execlist (exec.c:1275)
==9778==    by 0x42717C: execode (exec.c:1073)
==9778==    by 0x431299: runshfunc (exec.c:5040)
==9778==    by 0x430E76: doshfunc (exec.c:4920)
==9778==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9778== 
==9778== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9781== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9781-by-pythonnut-on-???
==9781== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9781-by-pythonnut-on-???
==9781== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9781-by-pythonnut-on-???
==9781== 
==9781== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9781== don't want to do, unless you know exactly what you're doing,
==9781== or are doing some strange experiment):
==9781==   /usr/lib/valgrind/../../bin/vgdb --pid=9781 ...command...
==9781== 
==9781== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9781==   /path/to/gdb ./zsh
==9781== and then give GDB the following command
==9781==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9781
==9781== --pid is optional if only one valgrind process is running
==9781== 
==9782== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9782-by-pythonnut-on-???
==9782== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9782-by-pythonnut-on-???
==9782== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9782-by-pythonnut-on-???
==9782== 
==9782== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9782== don't want to do, unless you know exactly what you're doing,
==9782== or are doing some strange experiment):
==9782==   /usr/lib/valgrind/../../bin/vgdb --pid=9782 ...command...
==9782== 
==9782== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9782==   /path/to/gdb ./zsh
==9782== and then give GDB the following command
==9782==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9782
==9782== --pid is optional if only one valgrind process is running
==9782== 
--9782-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9782-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9782== 
==9782== HEAP SUMMARY:
==9782==     in use at exit: 3,201,478 bytes in 69,248 blocks
==9782==   total heap usage: 1,584,716 allocs, 1,515,468 frees, 127,905,912 bytes allocated
==9782== 
==9782== Searching for pointers to 69,248 not-freed blocks
--9782--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9782--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9782--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9782--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9782--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9782--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9782--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9782--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9782--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9782--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9782--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9782--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9782--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9782--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9782--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9782--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9782--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9782--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9782--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9782--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9782--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9782--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9782--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9782--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9782--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9782--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9782--   Scanning root segment: 0x701a000..0x701afff (4096)
--9782--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9782--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9782--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9782--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9782--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9782--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9782--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9782--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9782--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9782--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9782== Checked 4,995,912 bytes
==9782== 
==9782== LEAK SUMMARY:
==9782==    definitely lost: 2,189 bytes in 12 blocks
==9782==    indirectly lost: 6,756 bytes in 7 blocks
==9782==      possibly lost: 0 bytes in 0 blocks
==9782==    still reachable: 3,192,533 bytes in 69,229 blocks
==9782==         suppressed: 0 bytes in 0 blocks
==9782== Rerun with --leak-check=full to see details of leaked memory
==9782== 
==9782== Use --track-origins=yes to see where uninitialised values come from
==9782== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9782== 
==9782== 1 errors in context 1 of 2:
==9782== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9782==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9782==    by 0x488CD0: stringsubst (subst.c:301)
==9782==    by 0x48801B: prefork (subst.c:77)
==9782==    by 0x42B318: execcmd (exec.c:2619)
==9782==    by 0x428CA0: execpline2 (exec.c:1697)
==9782==    by 0x427FD2: execpline (exec.c:1484)
==9782==    by 0x427756: execlist (exec.c:1267)
==9782==    by 0x42717C: execode (exec.c:1073)
==9782==    by 0x431299: runshfunc (exec.c:5040)
==9782==    by 0x430E76: doshfunc (exec.c:4920)
==9782==    by 0x4302FB: execshfunc (exec.c:4557)
==9782==    by 0x42D8C1: execcmd (exec.c:3373)
==9782== 
==9782== 
==9782== 2 errors in context 2 of 2:
==9782== Conditional jump or move depends on uninitialised value(s)
==9782==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9782==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9782==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9782==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9782==    by 0x42D8E9: execcmd (exec.c:3378)
==9782==    by 0x428CA0: execpline2 (exec.c:1697)
==9782==    by 0x427FD2: execpline (exec.c:1484)
==9782==    by 0x42779A: execlist (exec.c:1275)
==9782==    by 0x42717C: execode (exec.c:1073)
==9782==    by 0x431299: runshfunc (exec.c:5040)
==9782==    by 0x430E76: doshfunc (exec.c:4920)
==9782==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9782== 
==9782== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9781-- Caught __NR_exit; running __libc_freeres()
--9781-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9781== 
==9781== HEAP SUMMARY:
==9781==     in use at exit: 3,164,838 bytes in 69,245 blocks
==9781==   total heap usage: 1,584,719 allocs, 1,515,474 frees, 127,906,488 bytes allocated
==9781== 
==9781== Searching for pointers to 69,245 not-freed blocks
--9781--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9781--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9781--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9781--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9781--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9781--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9781--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9781--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9781--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9781--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9781--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9781--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9781--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9781--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9781--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9781--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9781--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9781--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9781--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9781--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9781--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9781--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9781--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9781--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9781--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9781--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9781--   Scanning root segment: 0x701a000..0x701afff (4096)
--9781--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9781--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9781--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9781--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9781--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9781--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9781--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9781--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9781--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9781--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9781== Checked 4,958,648 bytes
==9781== 
==9781== LEAK SUMMARY:
==9781==    definitely lost: 2,189 bytes in 12 blocks
==9781==    indirectly lost: 6,756 bytes in 7 blocks
==9781==      possibly lost: 0 bytes in 0 blocks
==9781==    still reachable: 3,155,893 bytes in 69,226 blocks
==9781==         suppressed: 0 bytes in 0 blocks
==9781== Rerun with --leak-check=full to see details of leaked memory
==9781== 
==9781== Use --track-origins=yes to see where uninitialised values come from
==9781== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9781== 
==9781== 1 errors in context 1 of 2:
==9781== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9781==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9781==    by 0x488CD0: stringsubst (subst.c:301)
==9781==    by 0x48801B: prefork (subst.c:77)
==9781==    by 0x42B318: execcmd (exec.c:2619)
==9781==    by 0x428CA0: execpline2 (exec.c:1697)
==9781==    by 0x427FD2: execpline (exec.c:1484)
==9781==    by 0x427756: execlist (exec.c:1267)
==9781==    by 0x42717C: execode (exec.c:1073)
==9781==    by 0x431299: runshfunc (exec.c:5040)
==9781==    by 0x430E76: doshfunc (exec.c:4920)
==9781==    by 0x4302FB: execshfunc (exec.c:4557)
==9781==    by 0x42D8C1: execcmd (exec.c:3373)
==9781== 
==9781== 
==9781== 2 errors in context 2 of 2:
==9781== Conditional jump or move depends on uninitialised value(s)
==9781==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9781==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9781==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9781==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9781==    by 0x42D8E9: execcmd (exec.c:3378)
==9781==    by 0x428CA0: execpline2 (exec.c:1697)
==9781==    by 0x427FD2: execpline (exec.c:1484)
==9781==    by 0x42779A: execlist (exec.c:1275)
==9781==    by 0x42717C: execode (exec.c:1073)
==9781==    by 0x431299: runshfunc (exec.c:5040)
==9781==    by 0x430E76: doshfunc (exec.c:4920)
==9781==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9781== 
==9781== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9784== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9784-by-pythonnut-on-???
==9784== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9784-by-pythonnut-on-???
==9784== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9784-by-pythonnut-on-???
==9784== 
==9784== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9784== don't want to do, unless you know exactly what you're doing,
==9784== or are doing some strange experiment):
==9784==   /usr/lib/valgrind/../../bin/vgdb --pid=9784 ...command...
==9784== 
==9784== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9784==   /path/to/gdb ./zsh
==9784== and then give GDB the following command
==9784==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9784
==9784== --pid is optional if only one valgrind process is running
==9784== 
--9785-- Caught __NR_exit; running __libc_freeres()
==9785== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9785-by-pythonnut-on-???
==9785== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9785-by-pythonnut-on-???
==9785== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9785-by-pythonnut-on-???
==9785== 
==9785== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9785== don't want to do, unless you know exactly what you're doing,
==9785== or are doing some strange experiment):
==9785==   /usr/lib/valgrind/../../bin/vgdb --pid=9785 ...command...
==9785== 
==9785== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9785==   /path/to/gdb ./zsh
==9785== and then give GDB the following command
==9785==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9785
==9785== --pid is optional if only one valgrind process is running
==9785== 
--9785-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9785== 
==9785== HEAP SUMMARY:
==9785==     in use at exit: 3,165,694 bytes in 69,251 blocks
==9785==   total heap usage: 1,584,728 allocs, 1,515,477 frees, 127,874,200 bytes allocated
==9785== 
==9785== Searching for pointers to 69,251 not-freed blocks
--9785--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9785--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9785--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9785--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9785--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9785--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9785--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9785--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9785--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9785--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9785--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9785--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9785--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9785--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9785--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9785--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9785--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9785--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9785--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9785--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9785--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9785--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9785--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9785--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9785--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9785--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9785--   Scanning root segment: 0x701a000..0x701afff (4096)
--9785--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9785--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9785--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9785--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9785--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9785--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9785--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9785--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9785--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9785--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9785== Checked 4,922,968 bytes
==9785== 
==9785== LEAK SUMMARY:
==9785==    definitely lost: 2,189 bytes in 12 blocks
==9785==    indirectly lost: 6,756 bytes in 7 blocks
==9785==      possibly lost: 0 bytes in 0 blocks
==9785==    still reachable: 3,156,749 bytes in 69,232 blocks
==9785==         suppressed: 0 bytes in 0 blocks
==9785== Rerun with --leak-check=full to see details of leaked memory
==9785== 
==9785== Use --track-origins=yes to see where uninitialised values come from
==9785== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9785== 
==9785== 1 errors in context 1 of 2:
==9785== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9785==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9785==    by 0x488CD0: stringsubst (subst.c:301)
==9785==    by 0x48801B: prefork (subst.c:77)
==9785==    by 0x42B318: execcmd (exec.c:2619)
==9785==    by 0x428CA0: execpline2 (exec.c:1697)
==9785==    by 0x427FD2: execpline (exec.c:1484)
==9785==    by 0x427756: execlist (exec.c:1267)
==9785==    by 0x42717C: execode (exec.c:1073)
==9785==    by 0x431299: runshfunc (exec.c:5040)
==9785==    by 0x430E76: doshfunc (exec.c:4920)
==9785==    by 0x4302FB: execshfunc (exec.c:4557)
==9785==    by 0x42D8C1: execcmd (exec.c:3373)
==9785== 
==9785== 
==9785== 2 errors in context 2 of 2:
==9785== Conditional jump or move depends on uninitialised value(s)
==9785==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9785==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9785==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9785==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9785==    by 0x42D8E9: execcmd (exec.c:3378)
==9785==    by 0x428CA0: execpline2 (exec.c:1697)
==9785==    by 0x427FD2: execpline (exec.c:1484)
==9785==    by 0x42779A: execlist (exec.c:1275)
==9785==    by 0x42717C: execode (exec.c:1073)
==9785==    by 0x431299: runshfunc (exec.c:5040)
==9785==    by 0x430E76: doshfunc (exec.c:4920)
==9785==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9785== 
==9785== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9784-- Caught __NR_exit; running __libc_freeres()
--9784-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9784== 
==9784== HEAP SUMMARY:
==9784==     in use at exit: 3,165,459 bytes in 69,251 blocks
==9784==   total heap usage: 1,584,765 allocs, 1,515,514 frees, 127,883,709 bytes allocated
==9784== 
==9784== Searching for pointers to 69,251 not-freed blocks
--9784--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9784--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9784--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9784--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9784--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9784--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9784--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9784--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9784--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9784--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9784--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9784--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9784--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9784--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9784--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9784--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9784--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9784--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9784--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9784--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9784--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9784--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9784--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9784--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9784--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9784--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9784--   Scanning root segment: 0x701a000..0x701afff (4096)
--9784--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9784--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9784--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9784--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9784--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9784--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9784--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9784--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9784--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9784--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9784== Checked 4,922,160 bytes
==9784== 
==9784== LEAK SUMMARY:
==9784==    definitely lost: 2,189 bytes in 12 blocks
==9784==    indirectly lost: 6,756 bytes in 7 blocks
==9784==      possibly lost: 0 bytes in 0 blocks
==9784==    still reachable: 3,156,514 bytes in 69,232 blocks
==9784==         suppressed: 0 bytes in 0 blocks
==9784== Rerun with --leak-check=full to see details of leaked memory
==9784== 
==9784== Use --track-origins=yes to see where uninitialised values come from
==9784== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9784== 
==9784== 1 errors in context 1 of 2:
==9784== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9784==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9784==    by 0x488CD0: stringsubst (subst.c:301)
==9784==    by 0x48801B: prefork (subst.c:77)
==9784==    by 0x42B318: execcmd (exec.c:2619)
==9784==    by 0x428CA0: execpline2 (exec.c:1697)
==9784==    by 0x427FD2: execpline (exec.c:1484)
==9784==    by 0x427756: execlist (exec.c:1267)
==9784==    by 0x42717C: execode (exec.c:1073)
==9784==    by 0x431299: runshfunc (exec.c:5040)
==9784==    by 0x430E76: doshfunc (exec.c:4920)
==9784==    by 0x4302FB: execshfunc (exec.c:4557)
==9784==    by 0x42D8C1: execcmd (exec.c:3373)
==9784== 
==9784== 
==9784== 2 errors in context 2 of 2:
==9784== Conditional jump or move depends on uninitialised value(s)
==9784==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9784==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9784==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9784==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9784==    by 0x42D8E9: execcmd (exec.c:3378)
==9784==    by 0x428CA0: execpline2 (exec.c:1697)
==9784==    by 0x427FD2: execpline (exec.c:1484)
==9784==    by 0x42779A: execlist (exec.c:1275)
==9784==    by 0x42717C: execode (exec.c:1073)
==9784==    by 0x431299: runshfunc (exec.c:5040)
==9784==    by 0x430E76: doshfunc (exec.c:4920)
==9784==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9784== 
==9784== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9788-- Caught __NR_exit; running __libc_freeres()
==9788== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9788-by-pythonnut-on-???
==9788== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9788-by-pythonnut-on-???
==9788== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9788-by-pythonnut-on-???
==9788== 
==9788== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9788== don't want to do, unless you know exactly what you're doing,
==9788== or are doing some strange experiment):
==9788==   /usr/lib/valgrind/../../bin/vgdb --pid=9788 ...command...
==9788== 
==9788== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9788==   /path/to/gdb ./zsh
==9788== and then give GDB the following command
==9788==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9788
==9788== --pid is optional if only one valgrind process is running
==9788== 
client request: code 4d430005,  addr 0xFFEFEAE9C,  len 4
--9788-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9789-- Caught __NR_exit; running __libc_freeres()
==9788== 
==9788== HEAP SUMMARY:
==9788==     in use at exit: 3,128,508 bytes in 69,251 blocks
==9788==   total heap usage: 1,584,737 allocs, 1,515,486 frees, 127,877,620 bytes allocated
==9788== 
==9789== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9789-by-pythonnut-on-???
==9789== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9789-by-pythonnut-on-???
==9789== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9789-by-pythonnut-on-???
==9789== 
==9789== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9789== don't want to do, unless you know exactly what you're doing,
==9789== or are doing some strange experiment):
==9789==   /usr/lib/valgrind/../../bin/vgdb --pid=9789 ...command...
==9789== 
==9789== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9789==   /path/to/gdb ./zsh
==9789== and then give GDB the following command
==9789==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9789
==9789== --pid is optional if only one valgrind process is running
==9789== 
--9789-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9789== 
==9788== Searching for pointers to 69,251 not-freed blocks
--9788--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9788--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9788--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9788--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9788--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9788--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9788--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9788--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9788--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9788--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9788--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9788--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9788--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9788--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9788--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9788--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9788--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9788--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9788--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9788--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9788--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9788--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9788--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9788--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9789== HEAP SUMMARY:
==9789==     in use at exit: 3,128,508 bytes in 69,251 blocks
==9789==   total heap usage: 1,584,742 allocs, 1,515,491 frees, 127,879,708 bytes allocated
==9789== 
--9788--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9788--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9788--   Scanning root segment: 0x701a000..0x701afff (4096)
--9788--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9788--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9788--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9788--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9788--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9788--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9788--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9788--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9788--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9788--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9789== Searching for pointers to 69,251 not-freed blocks
--9789--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9789--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9789--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9789--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9789--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9789--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9789--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9789--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9789--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9789--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9789--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9789--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9789--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9789--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9789--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9789--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9789--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9789--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9789--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9789--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9789--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9789--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9789--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9789--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9789--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9789--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9789--   Scanning root segment: 0x701a000..0x701afff (4096)
--9789--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9789--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9789--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9789--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9789--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9789--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9789--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9789--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9789--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9789--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9788== Checked 4,884,776 bytes
==9788== 
==9789== Checked 4,884,896 bytes
==9789== 
==9788== LEAK SUMMARY:
==9788==    definitely lost: 2,189 bytes in 12 blocks
==9788==    indirectly lost: 6,756 bytes in 7 blocks
==9788==      possibly lost: 0 bytes in 0 blocks
==9788==    still reachable: 3,119,563 bytes in 69,232 blocks
==9788==         suppressed: 0 bytes in 0 blocks
==9788== Rerun with --leak-check=full to see details of leaked memory
==9788== 
==9788== Use --track-origins=yes to see where uninitialised values come from
==9788== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9788== 
==9788== 1 errors in context 1 of 2:
==9788== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9788==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9788==    by 0x488CD0: stringsubst (subst.c:301)
==9788==    by 0x48801B: prefork (subst.c:77)
==9788==    by 0x42B318: execcmd (exec.c:2619)
==9788==    by 0x428CA0: execpline2 (exec.c:1697)
==9788==    by 0x427FD2: execpline (exec.c:1484)
==9788==    by 0x427756: execlist (exec.c:1267)
==9788==    by 0x42717C: execode (exec.c:1073)
==9788==    by 0x431299: runshfunc (exec.c:5040)
==9788==    by 0x430E76: doshfunc (exec.c:4920)
==9788==    by 0x4302FB: execshfunc (exec.c:4557)
==9788==    by 0x42D8C1: execcmd (exec.c:3373)
==9788== 
==9788== 
==9788== 2 errors in context 2 of 2:
==9788== Conditional jump or move depends on uninitialised value(s)
==9788==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9788==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9788==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9788==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9788==    by 0x42D8E9: execcmd (exec.c:3378)
==9788==    by 0x428CA0: execpline2 (exec.c:1697)
==9788==    by 0x427FD2: execpline (exec.c:1484)
==9788==    by 0x42779A: execlist (exec.c:1275)
==9788==    by 0x42717C: execode (exec.c:1073)
==9788==    by 0x431299: runshfunc (exec.c:5040)
==9788==    by 0x430E76: doshfunc (exec.c:4920)
==9788==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9788== 
==9788== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9789== LEAK SUMMARY:
==9789==    definitely lost: 2,213 bytes in 13 blocks
==9789==    indirectly lost: 6,796 bytes in 9 blocks
==9789==      possibly lost: 0 bytes in 0 blocks
==9789==    still reachable: 3,119,499 bytes in 69,229 blocks
==9789==         suppressed: 0 bytes in 0 blocks
==9789== Rerun with --leak-check=full to see details of leaked memory
==9789== 
==9789== Use --track-origins=yes to see where uninitialised values come from
==9789== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9789== 
==9789== 1 errors in context 1 of 2:
==9789== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9789==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9789==    by 0x488CD0: stringsubst (subst.c:301)
==9789==    by 0x48801B: prefork (subst.c:77)
==9789==    by 0x42B318: execcmd (exec.c:2619)
==9789==    by 0x428CA0: execpline2 (exec.c:1697)
==9789==    by 0x427FD2: execpline (exec.c:1484)
==9789==    by 0x427756: execlist (exec.c:1267)
==9789==    by 0x42717C: execode (exec.c:1073)
==9789==    by 0x431299: runshfunc (exec.c:5040)
==9789==    by 0x430E76: doshfunc (exec.c:4920)
==9789==    by 0x4302FB: execshfunc (exec.c:4557)
==9789==    by 0x42D8C1: execcmd (exec.c:3373)
==9789== 
==9789== 
==9789== 2 errors in context 2 of 2:
==9789== Conditional jump or move depends on uninitialised value(s)
==9789==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9789==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9789==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9789==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9789==    by 0x42D8E9: execcmd (exec.c:3378)
==9789==    by 0x428CA0: execpline2 (exec.c:1697)
==9789==    by 0x427FD2: execpline (exec.c:1484)
==9789==    by 0x42779A: execlist (exec.c:1275)
==9789==    by 0x42717C: execode (exec.c:1073)
==9789==    by 0x431299: runshfunc (exec.c:5040)
==9789==    by 0x430E76: doshfunc (exec.c:4920)
==9789==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9789== 
==9789== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEB81C,  len 4
--9773-- Caught __NR_exit; running __libc_freeres()
--9773-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9773== 
==9773== HEAP SUMMARY:
==9773==     in use at exit: 3,127,562 bytes in 69,228 blocks
==9773==   total heap usage: 1,584,743 allocs, 1,515,515 frees, 127,880,276 bytes allocated
==9773== 
==9773== Searching for pointers to 69,228 not-freed blocks
--9773--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9773--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9773--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9773--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9773--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9773--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9773--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9773--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9773--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9773--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9773--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9773--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9773--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9773--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9773--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9773--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9773--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9773--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9773--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9773--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9773--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9773--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9773--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9773--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9773--   Scanning root segment: 0x701a000..0x701afff (4096)
--9773--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9773--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9773--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9773--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9773--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9773--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9773--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9773--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9773--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9773--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9773== Checked 4,791,768 bytes
==9773== 
==9773== LEAK SUMMARY:
==9773==    definitely lost: 2,189 bytes in 12 blocks
==9773==    indirectly lost: 6,756 bytes in 7 blocks
==9773==      possibly lost: 0 bytes in 0 blocks
==9773==    still reachable: 3,118,617 bytes in 69,209 blocks
==9773==         suppressed: 0 bytes in 0 blocks
==9773== Rerun with --leak-check=full to see details of leaked memory
==9773== 
==9773== Use --track-origins=yes to see where uninitialised values come from
==9773== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9773== 
==9773== 1 errors in context 1 of 2:
==9773== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9773==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9773==    by 0x488CD0: stringsubst (subst.c:301)
==9773==    by 0x48801B: prefork (subst.c:77)
==9773==    by 0x42B318: execcmd (exec.c:2619)
==9773==    by 0x428CA0: execpline2 (exec.c:1697)
==9773==    by 0x427FD2: execpline (exec.c:1484)
==9773==    by 0x427756: execlist (exec.c:1267)
==9773==    by 0x42717C: execode (exec.c:1073)
==9773==    by 0x431299: runshfunc (exec.c:5040)
==9773==    by 0x430E76: doshfunc (exec.c:4920)
==9773==    by 0x4302FB: execshfunc (exec.c:4557)
==9773==    by 0x42D8C1: execcmd (exec.c:3373)
==9773== 
==9773== 
==9773== 2 errors in context 2 of 2:
==9773== Conditional jump or move depends on uninitialised value(s)
==9773==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9773==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9773==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9773==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9773==    by 0x42D8E9: execcmd (exec.c:3378)
==9773==    by 0x428CA0: execpline2 (exec.c:1697)
==9773==    by 0x427FD2: execpline (exec.c:1484)
==9773==    by 0x42779A: execlist (exec.c:1275)
==9773==    by 0x42717C: execode (exec.c:1073)
==9773==    by 0x431299: runshfunc (exec.c:5040)
==9773==    by 0x430E76: doshfunc (exec.c:4920)
==9773==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9773== 
==9773== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9793== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9793-by-pythonnut-on-???
==9793== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9793-by-pythonnut-on-???
==9793== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9793-by-pythonnut-on-???
==9793== 
==9793== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9793== don't want to do, unless you know exactly what you're doing,
==9793== or are doing some strange experiment):
==9793==   /usr/lib/valgrind/../../bin/vgdb --pid=9793 ...command...
==9793== 
==9793== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9793==   /path/to/gdb ./zsh
==9793== and then give GDB the following command
==9793==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9793
==9793== --pid is optional if only one valgrind process is running
==9793== 
==9792== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9792-by-pythonnut-on-???
==9792== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9792-by-pythonnut-on-???
==9792== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9792-by-pythonnut-on-???
==9792== 
==9792== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9792== don't want to do, unless you know exactly what you're doing,
==9792== or are doing some strange experiment):
==9792==   /usr/lib/valgrind/../../bin/vgdb --pid=9792 ...command...
==9792== 
==9792== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9792==   /path/to/gdb ./zsh
==9792== and then give GDB the following command
==9792==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9792
==9792== --pid is optional if only one valgrind process is running
==9792== 
--9793-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEC14C,  len 4
client request: code 4d430005,  addr 0xFFEFEC0AC,  len 4
--9793-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9793== 
==9793== HEAP SUMMARY:
==9793==     in use at exit: 3,127,452 bytes in 69,229 blocks
==9793==   total heap usage: 1,584,688 allocs, 1,515,459 frees, 127,829,685 bytes allocated
==9793== 
==9793== Searching for pointers to 69,229 not-freed blocks
--9793--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9793--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9793--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9793--   Scanning root segment: 0x4037000..0x403afff (16384)
--9793--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9793--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9793--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9793--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9793--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9793--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9793--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9793--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9793--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9793--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9793--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9793--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9793--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9793--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9793--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9793--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9793--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9793--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9793--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9793--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9793--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9793--   Scanning root segment: 0x701a000..0x701afff (4096)
--9793--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9793--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9793--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9793--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9793--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9793--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9793--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9793--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9793--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9793--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9793== Checked 4,809,000 bytes
==9793== 
==9793== LEAK SUMMARY:
==9793==    definitely lost: 2,189 bytes in 12 blocks
==9793==    indirectly lost: 6,756 bytes in 7 blocks
==9793==      possibly lost: 0 bytes in 0 blocks
==9793==    still reachable: 3,118,507 bytes in 69,210 blocks
==9793==         suppressed: 0 bytes in 0 blocks
==9793== Rerun with --leak-check=full to see details of leaked memory
==9793== 
==9793== Use --track-origins=yes to see where uninitialised values come from
==9793== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9793== 
==9793== 1 errors in context 1 of 2:
==9793== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9793==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9793==    by 0x488CD0: stringsubst (subst.c:301)
==9793==    by 0x48801B: prefork (subst.c:77)
==9793==    by 0x42B318: execcmd (exec.c:2619)
==9793==    by 0x428CA0: execpline2 (exec.c:1697)
==9793==    by 0x427FD2: execpline (exec.c:1484)
==9793==    by 0x427756: execlist (exec.c:1267)
==9793==    by 0x42717C: execode (exec.c:1073)
==9793==    by 0x431299: runshfunc (exec.c:5040)
==9793==    by 0x430E76: doshfunc (exec.c:4920)
==9793==    by 0x4302FB: execshfunc (exec.c:4557)
==9793==    by 0x42D8C1: execcmd (exec.c:3373)
==9793== 
==9793== 
==9793== 2 errors in context 2 of 2:
==9793== Conditional jump or move depends on uninitialised value(s)
==9793==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9793==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9793==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9793==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9793==    by 0x42D8E9: execcmd (exec.c:3378)
==9793==    by 0x428CA0: execpline2 (exec.c:1697)
==9793==    by 0x427FD2: execpline (exec.c:1484)
==9793==    by 0x42779A: execlist (exec.c:1275)
==9793==    by 0x42717C: execode (exec.c:1073)
==9793==    by 0x431299: runshfunc (exec.c:5040)
==9793==    by 0x430E76: doshfunc (exec.c:4920)
==9793==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9793== 
==9793== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9792-- Caught __NR_exit; running __libc_freeres()
--9792-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9792== 
==9792== HEAP SUMMARY:
==9792==     in use at exit: 3,127,388 bytes in 69,226 blocks
==9792==   total heap usage: 1,584,693 allocs, 1,515,467 frees, 127,830,541 bytes allocated
==9792== 
==9792== Searching for pointers to 69,226 not-freed blocks
--9792--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9792--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9792--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9792--   Scanning root segment: 0x4037000..0x403afff (16384)
--9792--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9792--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9792--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9792--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9792--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9792--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9792--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9792--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9792--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9792--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9792--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9792--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9792--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9792--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9792--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9792--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9792--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9792--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9792--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9792--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9792--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9792--   Scanning root segment: 0x701a000..0x701afff (4096)
--9792--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9792--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9792--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9792--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9792--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9792--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9792--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9792--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9792--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9792--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9792== Checked 4,808,312 bytes
==9792== 
==9792== LEAK SUMMARY:
==9792==    definitely lost: 2,189 bytes in 12 blocks
==9792==    indirectly lost: 6,756 bytes in 7 blocks
==9792==      possibly lost: 0 bytes in 0 blocks
==9792==    still reachable: 3,118,443 bytes in 69,207 blocks
==9792==         suppressed: 0 bytes in 0 blocks
==9792== Rerun with --leak-check=full to see details of leaked memory
==9792== 
==9792== Use --track-origins=yes to see where uninitialised values come from
==9792== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9792== 
==9792== 1 errors in context 1 of 2:
==9792== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9792==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9792==    by 0x488CD0: stringsubst (subst.c:301)
==9792==    by 0x48801B: prefork (subst.c:77)
==9792==    by 0x42B318: execcmd (exec.c:2619)
==9792==    by 0x428CA0: execpline2 (exec.c:1697)
==9792==    by 0x427FD2: execpline (exec.c:1484)
==9792==    by 0x427756: execlist (exec.c:1267)
==9792==    by 0x42717C: execode (exec.c:1073)
==9792==    by 0x431299: runshfunc (exec.c:5040)
==9792==    by 0x430E76: doshfunc (exec.c:4920)
==9792==    by 0x4302FB: execshfunc (exec.c:4557)
==9792==    by 0x42D8C1: execcmd (exec.c:3373)
==9792== 
==9792== 
==9792== 2 errors in context 2 of 2:
==9792== Conditional jump or move depends on uninitialised value(s)
==9792==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9792==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9792==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9792==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9792==    by 0x42D8E9: execcmd (exec.c:3378)
==9792==    by 0x428CA0: execpline2 (exec.c:1697)
==9792==    by 0x427FD2: execpline (exec.c:1484)
==9792==    by 0x42779A: execlist (exec.c:1275)
==9792==    by 0x42717C: execode (exec.c:1073)
==9792==    by 0x431299: runshfunc (exec.c:5040)
==9792==    by 0x430E76: doshfunc (exec.c:4920)
==9792==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9792== 
==9792== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9796== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9796-by-pythonnut-on-???
==9796== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9796-by-pythonnut-on-???
==9796== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9796-by-pythonnut-on-???
==9796== 
==9796== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9796== don't want to do, unless you know exactly what you're doing,
==9796== or are doing some strange experiment):
==9796==   /usr/lib/valgrind/../../bin/vgdb --pid=9796 ...command...
==9796== 
==9796== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9796==   /path/to/gdb ./zsh
==9796== and then give GDB the following command
==9796==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9796
==9796== --pid is optional if only one valgrind process is running
==9796== 
==9797== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9797-by-pythonnut-on-???
==9797== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9797-by-pythonnut-on-???
==9797== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9797-by-pythonnut-on-???
==9797== 
==9797== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9797== don't want to do, unless you know exactly what you're doing,
==9797== or are doing some strange experiment):
==9797==   /usr/lib/valgrind/../../bin/vgdb --pid=9797 ...command...
==9797== 
==9797== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9797==   /path/to/gdb ./zsh
==9797== and then give GDB the following command
==9797==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9797
==9797== --pid is optional if only one valgrind process is running
==9797== 
--9797-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEACEC,  len 4
client request: code 4d430005,  addr 0xFFEFEAC4C,  len 4
--9797-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9797== 
==9797== HEAP SUMMARY:
==9797==     in use at exit: 3,127,696 bytes in 69,232 blocks
==9797==   total heap usage: 1,584,722 allocs, 1,515,490 frees, 127,842,976 bytes allocated
==9797== 
==9797== Searching for pointers to 69,232 not-freed blocks
--9797--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9797--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9797--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9797--   Scanning root segment: 0x4037000..0x403afff (16384)
--9797--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9797--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9797--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9797--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9797--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9797--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9797--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9797--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9797--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9797--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9797--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9797--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9797--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9797--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9797--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9797--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9797--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9797--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9797--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9797--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9797--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9797--   Scanning root segment: 0x701a000..0x701afff (4096)
--9797--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9797--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9797--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9797--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9797--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9797--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9797--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9797--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9797--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9797--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9797== Checked 4,810,552 bytes
==9797== 
==9797== LEAK SUMMARY:
==9797==    definitely lost: 2,189 bytes in 12 blocks
==9797==    indirectly lost: 6,756 bytes in 7 blocks
==9797==      possibly lost: 0 bytes in 0 blocks
==9797==    still reachable: 3,118,751 bytes in 69,213 blocks
==9797==         suppressed: 0 bytes in 0 blocks
==9797== Rerun with --leak-check=full to see details of leaked memory
==9797== 
==9797== Use --track-origins=yes to see where uninitialised values come from
==9797== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9797== 
==9797== 1 errors in context 1 of 2:
==9797== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9797==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9797==    by 0x488CD0: stringsubst (subst.c:301)
==9797==    by 0x48801B: prefork (subst.c:77)
==9797==    by 0x42B318: execcmd (exec.c:2619)
==9797==    by 0x428CA0: execpline2 (exec.c:1697)
==9797==    by 0x427FD2: execpline (exec.c:1484)
==9797==    by 0x427756: execlist (exec.c:1267)
==9797==    by 0x42717C: execode (exec.c:1073)
==9797==    by 0x431299: runshfunc (exec.c:5040)
==9797==    by 0x430E76: doshfunc (exec.c:4920)
==9797==    by 0x4302FB: execshfunc (exec.c:4557)
==9797==    by 0x42D8C1: execcmd (exec.c:3373)
==9797== 
==9797== 
==9797== 2 errors in context 2 of 2:
==9797== Conditional jump or move depends on uninitialised value(s)
==9797==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9797==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9797==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9797==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9797==    by 0x42D8E9: execcmd (exec.c:3378)
==9797==    by 0x428CA0: execpline2 (exec.c:1697)
==9797==    by 0x427FD2: execpline (exec.c:1484)
==9797==    by 0x42779A: execlist (exec.c:1275)
==9797==    by 0x42717C: execode (exec.c:1073)
==9797==    by 0x431299: runshfunc (exec.c:5040)
==9797==    by 0x430E76: doshfunc (exec.c:4920)
==9797==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9797== 
==9797== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9796-- Caught __NR_exit; running __libc_freeres()
--9796-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9796== 
==9796== HEAP SUMMARY:
==9796==     in use at exit: 3,127,727 bytes in 69,233 blocks
==9796==   total heap usage: 1,584,718 allocs, 1,515,485 frees, 127,839,424 bytes allocated
==9796== 
==9796== Searching for pointers to 69,233 not-freed blocks
--9796--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9796--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9796--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9796--   Scanning root segment: 0x4037000..0x403afff (16384)
--9796--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9796--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9796--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9796--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9796--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9796--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9796--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9796--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9796--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9796--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9796--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9796--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9796--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9796--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9796--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9796--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9796--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9796--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9796--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9796--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9796--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9796--   Scanning root segment: 0x701a000..0x701afff (4096)
--9796--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9796--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9796--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9796--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9796--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9796--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9796--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9796--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9796--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9796--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9796== Checked 4,810,256 bytes
==9796== 
==9796== LEAK SUMMARY:
==9796==    definitely lost: 2,189 bytes in 12 blocks
==9796==    indirectly lost: 6,756 bytes in 7 blocks
==9796==      possibly lost: 0 bytes in 0 blocks
==9796==    still reachable: 3,118,782 bytes in 69,214 blocks
==9796==         suppressed: 0 bytes in 0 blocks
==9796== Rerun with --leak-check=full to see details of leaked memory
==9796== 
==9796== Use --track-origins=yes to see where uninitialised values come from
==9796== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9796== 
==9796== 1 errors in context 1 of 2:
==9796== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9796==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9796==    by 0x488CD0: stringsubst (subst.c:301)
==9796==    by 0x48801B: prefork (subst.c:77)
==9796==    by 0x42B318: execcmd (exec.c:2619)
==9796==    by 0x428CA0: execpline2 (exec.c:1697)
==9796==    by 0x427FD2: execpline (exec.c:1484)
==9796==    by 0x427756: execlist (exec.c:1267)
==9796==    by 0x42717C: execode (exec.c:1073)
==9796==    by 0x431299: runshfunc (exec.c:5040)
==9796==    by 0x430E76: doshfunc (exec.c:4920)
==9796==    by 0x4302FB: execshfunc (exec.c:4557)
==9796==    by 0x42D8C1: execcmd (exec.c:3373)
==9796== 
==9796== 
==9796== 2 errors in context 2 of 2:
==9796== Conditional jump or move depends on uninitialised value(s)
==9796==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9796==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9796==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9796==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9796==    by 0x42D8E9: execcmd (exec.c:3378)
==9796==    by 0x428CA0: execpline2 (exec.c:1697)
==9796==    by 0x427FD2: execpline (exec.c:1484)
==9796==    by 0x42779A: execlist (exec.c:1275)
==9796==    by 0x42717C: execode (exec.c:1073)
==9796==    by 0x431299: runshfunc (exec.c:5040)
==9796==    by 0x430E76: doshfunc (exec.c:4920)
==9796==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9796== 
==9796== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9803== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9803-by-pythonnut-on-???
==9803== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9803-by-pythonnut-on-???
==9803== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9803-by-pythonnut-on-???
==9803== 
==9803== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9803== don't want to do, unless you know exactly what you're doing,
==9803== or are doing some strange experiment):
==9803==   /usr/lib/valgrind/../../bin/vgdb --pid=9803 ...command...
==9803== 
==9803== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9803==   /path/to/gdb ./zsh
==9803== and then give GDB the following command
==9803==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9803
==9803== --pid is optional if only one valgrind process is running
==9803== 
client request: code 4d430005,  addr 0xFFEFEB23C,  len 4
==9802== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9802-by-pythonnut-on-???
==9802== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9802-by-pythonnut-on-???
==9802== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9802-by-pythonnut-on-???
==9802== 
==9802== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9802== don't want to do, unless you know exactly what you're doing,
==9802== or are doing some strange experiment):
==9802==   /usr/lib/valgrind/../../bin/vgdb --pid=9802 ...command...
==9802== 
==9802== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9802==   /path/to/gdb ./zsh
==9802== and then give GDB the following command
==9802==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9802
==9802== --pid is optional if only one valgrind process is running
==9802== 
--9802-- Caught __NR_exit; running __libc_freeres()
--9802-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9802== 
==9802== HEAP SUMMARY:
==9802==     in use at exit: 3,127,987 bytes in 69,238 blocks
==9802==   total heap usage: 1,584,729 allocs, 1,515,491 frees, 127,844,564 bytes allocated
==9802== 
==9802== Searching for pointers to 69,238 not-freed blocks
--9802--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9802--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9802--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9802--   Scanning root segment: 0x4037000..0x403afff (16384)
--9802--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9802--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9802--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9802--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9802--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9802--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9802--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9802--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9802--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9802--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9802--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9802--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9802--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9802--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9802--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9802--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9802--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9802--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9802--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9802--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9802--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9802--   Scanning root segment: 0x701a000..0x701afff (4096)
--9802--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9802--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9802--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9802--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9802--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9802--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9802--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9802--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9802--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9802--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9802== Checked 4,810,256 bytes
==9802== 
==9802== LEAK SUMMARY:
==9802==    definitely lost: 2,189 bytes in 12 blocks
==9802==    indirectly lost: 6,756 bytes in 7 blocks
==9802==      possibly lost: 0 bytes in 0 blocks
==9802==    still reachable: 3,119,042 bytes in 69,219 blocks
==9802==         suppressed: 0 bytes in 0 blocks
==9802== Rerun with --leak-check=full to see details of leaked memory
==9802== 
==9802== Use --track-origins=yes to see where uninitialised values come from
==9802== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9802== 
==9802== 1 errors in context 1 of 2:
==9802== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9802==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9802==    by 0x488CD0: stringsubst (subst.c:301)
==9802==    by 0x48801B: prefork (subst.c:77)
==9802==    by 0x42B318: execcmd (exec.c:2619)
==9802==    by 0x428CA0: execpline2 (exec.c:1697)
==9802==    by 0x427FD2: execpline (exec.c:1484)
==9802==    by 0x427756: execlist (exec.c:1267)
==9802==    by 0x42717C: execode (exec.c:1073)
==9802==    by 0x431299: runshfunc (exec.c:5040)
==9802==    by 0x430E76: doshfunc (exec.c:4920)
==9802==    by 0x4302FB: execshfunc (exec.c:4557)
==9802==    by 0x42D8C1: execcmd (exec.c:3373)
==9802== 
==9802== 
==9802== 2 errors in context 2 of 2:
==9802== Conditional jump or move depends on uninitialised value(s)
==9802==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9802==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9802==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9802==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9802==    by 0x42D8E9: execcmd (exec.c:3378)
==9802==    by 0x428CA0: execpline2 (exec.c:1697)
==9802==    by 0x427FD2: execpline (exec.c:1484)
==9802==    by 0x42779A: execlist (exec.c:1275)
==9802==    by 0x42717C: execode (exec.c:1073)
==9802==    by 0x431299: runshfunc (exec.c:5040)
==9802==    by 0x430E76: doshfunc (exec.c:4920)
==9802==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9802== 
==9802== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEAD8C,  len 4
--9804-- Caught __NR_exit; running __libc_freeres()
==9804== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9804-by-pythonnut-on-???
==9804== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9804-by-pythonnut-on-???
==9804== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9804-by-pythonnut-on-???
==9804== 
==9804== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9804== don't want to do, unless you know exactly what you're doing,
==9804== or are doing some strange experiment):
==9804==   /usr/lib/valgrind/../../bin/vgdb --pid=9804 ...command...
==9804== 
==9804== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9804==   /path/to/gdb ./zsh
==9804== and then give GDB the following command
==9804==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9804
==9804== --pid is optional if only one valgrind process is running
==9804== 
--9804-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9804== 
==9804== HEAP SUMMARY:
==9804==     in use at exit: 3,128,016 bytes in 69,239 blocks
==9804==   total heap usage: 1,584,734 allocs, 1,515,495 frees, 127,846,705 bytes allocated
==9804== 
==9804== Searching for pointers to 69,239 not-freed blocks
--9804--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9804--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9804--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9804--   Scanning root segment: 0x4037000..0x403afff (16384)
--9804--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9804--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9804--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9804--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9804--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9804--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9804--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9804--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9804--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9804--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9804--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9804--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9804--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9804--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9804--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9804--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9804--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9804--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9804--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9804--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9804--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9804--   Scanning root segment: 0x701a000..0x701afff (4096)
--9804--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9804--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9804--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9804--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9804--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9804--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9804--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9804--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9804--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9804--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9804== Checked 4,810,552 bytes
==9804== 
==9804== LEAK SUMMARY:
==9804==    definitely lost: 2,189 bytes in 12 blocks
==9804==    indirectly lost: 6,756 bytes in 7 blocks
==9804==      possibly lost: 0 bytes in 0 blocks
==9804==    still reachable: 3,119,071 bytes in 69,220 blocks
==9804==         suppressed: 0 bytes in 0 blocks
==9804== Rerun with --leak-check=full to see details of leaked memory
==9804== 
==9804== Use --track-origins=yes to see where uninitialised values come from
==9804== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9804== 
==9804== 1 errors in context 1 of 2:
==9804== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9804==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9804==    by 0x488CD0: stringsubst (subst.c:301)
==9804==    by 0x48801B: prefork (subst.c:77)
==9804==    by 0x42B318: execcmd (exec.c:2619)
==9804==    by 0x428CA0: execpline2 (exec.c:1697)
==9804==    by 0x427FD2: execpline (exec.c:1484)
==9804==    by 0x427756: execlist (exec.c:1267)
==9804==    by 0x42717C: execode (exec.c:1073)
==9804==    by 0x431299: runshfunc (exec.c:5040)
==9804==    by 0x430E76: doshfunc (exec.c:4920)
==9804==    by 0x4302FB: execshfunc (exec.c:4557)
==9804==    by 0x42D8C1: execcmd (exec.c:3373)
==9804== 
==9804== 
==9804== 2 errors in context 2 of 2:
==9804== Conditional jump or move depends on uninitialised value(s)
==9804==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9804==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9804==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9804==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9804==    by 0x42D8E9: execcmd (exec.c:3378)
==9804==    by 0x428CA0: execpline2 (exec.c:1697)
==9804==    by 0x427FD2: execpline (exec.c:1484)
==9804==    by 0x42779A: execlist (exec.c:1275)
==9804==    by 0x42717C: execode (exec.c:1073)
==9804==    by 0x431299: runshfunc (exec.c:5040)
==9804==    by 0x430E76: doshfunc (exec.c:4920)
==9804==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9804== 
==9804== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9806== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9806-by-pythonnut-on-???
==9806== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9806-by-pythonnut-on-???
==9806== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9806-by-pythonnut-on-???
==9806== 
==9806== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9806== don't want to do, unless you know exactly what you're doing,
==9806== or are doing some strange experiment):
==9806==   /usr/lib/valgrind/../../bin/vgdb --pid=9806 ...command...
==9806== 
==9806== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9806==   /path/to/gdb ./zsh
==9806== and then give GDB the following command
==9806==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9806
==9806== --pid is optional if only one valgrind process is running
==9806== 
client request: code 4d430005,  addr 0xFFEFEB70C,  len 4
client request: code 4d430005,  addr 0xFFEFEB08C,  len 4
--9772-- Caught __NR_exit; running __libc_freeres()
--9772-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9772== 
==9772== HEAP SUMMARY:
==9772==     in use at exit: 3,126,120 bytes in 69,190 blocks
==9772==   total heap usage: 1,584,743 allocs, 1,515,553 frees, 127,850,645 bytes allocated
==9772== 
==9772== Searching for pointers to 69,190 not-freed blocks
--9772--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9772--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9772--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9772--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9772--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9772--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9772--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9772--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9772--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9772--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9772--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9772--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9772--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9772--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9772--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9772--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9772--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9772--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9772--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9772--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9772--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9772--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9772--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9772--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9772--   Scanning root segment: 0x701a000..0x701afff (4096)
--9772--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9772--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9772--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9772--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9772--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9772--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9772--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9772--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9772--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9772--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9772== Checked 4,788,384 bytes
==9772== 
==9772== LEAK SUMMARY:
==9772==    definitely lost: 2,189 bytes in 12 blocks
==9772==    indirectly lost: 6,756 bytes in 7 blocks
==9772==      possibly lost: 0 bytes in 0 blocks
==9772==    still reachable: 3,117,175 bytes in 69,171 blocks
==9772==         suppressed: 0 bytes in 0 blocks
==9772== Rerun with --leak-check=full to see details of leaked memory
==9772== 
==9772== Use --track-origins=yes to see where uninitialised values come from
==9772== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9772== 
==9772== 1 errors in context 1 of 2:
==9772== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9772==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9772==    by 0x488CD0: stringsubst (subst.c:301)
==9772==    by 0x48801B: prefork (subst.c:77)
==9772==    by 0x42B318: execcmd (exec.c:2619)
==9772==    by 0x428CA0: execpline2 (exec.c:1697)
==9772==    by 0x427FD2: execpline (exec.c:1484)
==9772==    by 0x427756: execlist (exec.c:1267)
==9772==    by 0x42717C: execode (exec.c:1073)
==9772==    by 0x431299: runshfunc (exec.c:5040)
==9772==    by 0x430E76: doshfunc (exec.c:4920)
==9772==    by 0x4302FB: execshfunc (exec.c:4557)
==9772==    by 0x42D8C1: execcmd (exec.c:3373)
==9772== 
==9772== 
==9772== 2 errors in context 2 of 2:
==9772== Conditional jump or move depends on uninitialised value(s)
==9772==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9772==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9772==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9772==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9772==    by 0x42D8E9: execcmd (exec.c:3378)
==9772==    by 0x428CA0: execpline2 (exec.c:1697)
==9772==    by 0x427FD2: execpline (exec.c:1484)
==9772==    by 0x42779A: execlist (exec.c:1275)
==9772==    by 0x42717C: execode (exec.c:1073)
==9772==    by 0x431299: runshfunc (exec.c:5040)
==9772==    by 0x430E76: doshfunc (exec.c:4920)
==9772==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9772== 
==9772== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9808== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9808-by-pythonnut-on-???
==9808== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9808-by-pythonnut-on-???
==9808== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9808-by-pythonnut-on-???
==9808== 
==9808== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9808== don't want to do, unless you know exactly what you're doing,
==9808== or are doing some strange experiment):
==9808==   /usr/lib/valgrind/../../bin/vgdb --pid=9808 ...command...
==9808== 
==9808== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9808==   /path/to/gdb ./zsh
==9808== and then give GDB the following command
==9808==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9808
==9808== --pid is optional if only one valgrind process is running
==9808== 
--9809-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==9810== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9810-by-pythonnut-on-???
==9810== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9810-by-pythonnut-on-???
==9810== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9810-by-pythonnut-on-???
==9810== 
==9810== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9810== don't want to do, unless you know exactly what you're doing,
==9810== or are doing some strange experiment):
==9810==   /usr/lib/valgrind/../../bin/vgdb --pid=9810 ...command...
==9810== 
==9810== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9810==   /path/to/gdb ./zsh
==9810== and then give GDB the following command
==9810==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9810
==9810== --pid is optional if only one valgrind process is running
==9810== 
==9809== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9809-by-pythonnut-on-???
==9809== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9809-by-pythonnut-on-???
==9809== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9809-by-pythonnut-on-???
==9809== 
==9809== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9809== don't want to do, unless you know exactly what you're doing,
==9809== or are doing some strange experiment):
==9809==   /usr/lib/valgrind/../../bin/vgdb --pid=9809 ...command...
==9809== 
==9809== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9809==   /path/to/gdb ./zsh
==9809== and then give GDB the following command
==9809==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9809
==9809== --pid is optional if only one valgrind process is running
==9809== 
--9809-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9809== 
==9809== HEAP SUMMARY:
==9809==     in use at exit: 3,111,895 bytes in 68,920 blocks
==9809==   total heap usage: 1,584,898 allocs, 1,515,978 frees, 127,820,518 bytes allocated
==9809== 
==9809== Searching for pointers to 68,920 not-freed blocks
--9809--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9809--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9809--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9809--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9809--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9809--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9809--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9809--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9809--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9809--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9809--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9809--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9809--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9809--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9809--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9809--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9809--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9809--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9809--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9809--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9809--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9809--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9809--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9809--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9809--   Scanning root segment: 0x701a000..0x701afff (4096)
--9809--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9809--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9809--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9809--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9809--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9809--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9809--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9809--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9809--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9809--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9809== Checked 4,767,936 bytes
==9809== 
==9809== LEAK SUMMARY:
==9809==    definitely lost: 2,189 bytes in 12 blocks
==9809==    indirectly lost: 6,756 bytes in 7 blocks
==9809==      possibly lost: 0 bytes in 0 blocks
==9809==    still reachable: 3,102,950 bytes in 68,901 blocks
==9809==         suppressed: 0 bytes in 0 blocks
==9809== Rerun with --leak-check=full to see details of leaked memory
==9809== 
==9809== Use --track-origins=yes to see where uninitialised values come from
==9809== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9809== 
==9809== 1 errors in context 1 of 2:
==9809== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9809==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9809==    by 0x488CD0: stringsubst (subst.c:301)
==9809==    by 0x48801B: prefork (subst.c:77)
==9809==    by 0x42B318: execcmd (exec.c:2619)
==9809==    by 0x428CA0: execpline2 (exec.c:1697)
==9809==    by 0x427FD2: execpline (exec.c:1484)
==9809==    by 0x427756: execlist (exec.c:1267)
==9809==    by 0x42717C: execode (exec.c:1073)
==9809==    by 0x431299: runshfunc (exec.c:5040)
==9809==    by 0x430E76: doshfunc (exec.c:4920)
==9809==    by 0x4302FB: execshfunc (exec.c:4557)
==9809==    by 0x42D8C1: execcmd (exec.c:3373)
==9809== 
==9809== 
==9809== 2 errors in context 2 of 2:
==9809== Conditional jump or move depends on uninitialised value(s)
==9809==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9809==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9809==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9809==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9809==    by 0x42D8E9: execcmd (exec.c:3378)
==9809==    by 0x428CA0: execpline2 (exec.c:1697)
==9809==    by 0x427FD2: execpline (exec.c:1484)
==9809==    by 0x42779A: execlist (exec.c:1275)
==9809==    by 0x42717C: execode (exec.c:1073)
==9809==    by 0x431299: runshfunc (exec.c:5040)
==9809==    by 0x430E76: doshfunc (exec.c:4920)
==9809==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9809== 
==9809== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9808-- Caught __NR_exit; running __libc_freeres()
--9808-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9808== 
==9808== HEAP SUMMARY:
==9808==     in use at exit: 3,111,532 bytes in 68,910 blocks
==9808==   total heap usage: 1,584,901 allocs, 1,515,991 frees, 127,821,158 bytes allocated
==9808== 
==9808== Searching for pointers to 68,910 not-freed blocks
--9808--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9808--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9808--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9808--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9808--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9808--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9808--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9808--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9808--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9808--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9808--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9808--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9808--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9808--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9808--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9808--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9808--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9808--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9808--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9808--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9808--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9808--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9808--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9808--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9808--   Scanning root segment: 0x701a000..0x701afff (4096)
--9808--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9808--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9808--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9808--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9808--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9808--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9808--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9808--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9808--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9808--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9808== Checked 4,765,624 bytes
==9808== 
==9808== LEAK SUMMARY:
==9808==    definitely lost: 2,189 bytes in 12 blocks
==9808==    indirectly lost: 6,756 bytes in 7 blocks
==9808==      possibly lost: 0 bytes in 0 blocks
==9808==    still reachable: 3,102,587 bytes in 68,891 blocks
==9808==         suppressed: 0 bytes in 0 blocks
==9808== Rerun with --leak-check=full to see details of leaked memory
==9808== 
==9808== Use --track-origins=yes to see where uninitialised values come from
==9808== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9808== 
==9808== 1 errors in context 1 of 2:
==9808== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9808==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9808==    by 0x488CD0: stringsubst (subst.c:301)
==9808==    by 0x48801B: prefork (subst.c:77)
==9808==    by 0x42B318: execcmd (exec.c:2619)
==9808==    by 0x428CA0: execpline2 (exec.c:1697)
==9808==    by 0x427FD2: execpline (exec.c:1484)
==9808==    by 0x427756: execlist (exec.c:1267)
==9808==    by 0x42717C: execode (exec.c:1073)
==9808==    by 0x431299: runshfunc (exec.c:5040)
==9808==    by 0x430E76: doshfunc (exec.c:4920)
==9808==    by 0x4302FB: execshfunc (exec.c:4557)
==9808==    by 0x42D8C1: execcmd (exec.c:3373)
==9808== 
==9808== 
==9808== 2 errors in context 2 of 2:
==9808== Conditional jump or move depends on uninitialised value(s)
==9808==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9808==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9808==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9808==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9808==    by 0x42D8E9: execcmd (exec.c:3378)
==9808==    by 0x428CA0: execpline2 (exec.c:1697)
==9808==    by 0x427FD2: execpline (exec.c:1484)
==9808==    by 0x42779A: execlist (exec.c:1275)
==9808==    by 0x42717C: execode (exec.c:1073)
==9808==    by 0x431299: runshfunc (exec.c:5040)
==9808==    by 0x430E76: doshfunc (exec.c:4920)
==9808==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9808== 
==9808== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9814-- Caught __NR_exit; running __libc_freeres()
==9815== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9815-by-pythonnut-on-???
==9815== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9815-by-pythonnut-on-???
==9815== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9815-by-pythonnut-on-???
==9815== 
==9815== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9815== don't want to do, unless you know exactly what you're doing,
==9815== or are doing some strange experiment):
==9815==   /usr/lib/valgrind/../../bin/vgdb --pid=9815 ...command...
==9815== 
==9815== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9815==   /path/to/gdb ./zsh
==9815== and then give GDB the following command
==9815==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9815
==9815== --pid is optional if only one valgrind process is running
==9815== 
==9814== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9814-by-pythonnut-on-???
==9813== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9813-by-pythonnut-on-???
==9814== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9814-by-pythonnut-on-???
==9813== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9813-by-pythonnut-on-???
==9814== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9814-by-pythonnut-on-???
==9813== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9813-by-pythonnut-on-???
==9814== 
==9813== 
==9814== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9814== don't want to do, unless you know exactly what you're doing,
==9814== or are doing some strange experiment):
==9814==   /usr/lib/valgrind/../../bin/vgdb --pid=9814 ...command...
==9813== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9813== don't want to do, unless you know exactly what you're doing,
==9813== or are doing some strange experiment):
==9813==   /usr/lib/valgrind/../../bin/vgdb --pid=9813 ...command...
==9814== 
==9813== 
==9814== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9814==   /path/to/gdb ./zsh
==9814== and then give GDB the following command
==9814==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9814
==9814== --pid is optional if only one valgrind process is running
==9813== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9813==   /path/to/gdb ./zsh
==9813== and then give GDB the following command
==9813==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9813
==9814== 
==9813== --pid is optional if only one valgrind process is running
==9813== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
--9814-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
==9814== 
==9814== HEAP SUMMARY:
==9814==     in use at exit: 3,111,978 bytes in 68,921 blocks
==9814==   total heap usage: 1,584,931 allocs, 1,516,010 frees, 127,833,642 bytes allocated
==9814== 
==9814== Searching for pointers to 68,921 not-freed blocks
--9814--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9814--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9814--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9814--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9814--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9814--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9814--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9814--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9814--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9814--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9814--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9814--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9814--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9814--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9814--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9814--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9814--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9814--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9814--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9814--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9814--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9814--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9814--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9814--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9814--   Scanning root segment: 0x701a000..0x701afff (4096)
--9814--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9814--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9814--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9814--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9814--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9814--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9814--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9814--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9814--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9814--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9814== Checked 4,770,000 bytes
==9814== 
==9814== LEAK SUMMARY:
==9814==    definitely lost: 2,189 bytes in 12 blocks
==9814==    indirectly lost: 6,756 bytes in 7 blocks
==9814==      possibly lost: 0 bytes in 0 blocks
==9814==    still reachable: 3,103,033 bytes in 68,902 blocks
==9814==         suppressed: 0 bytes in 0 blocks
==9814== Rerun with --leak-check=full to see details of leaked memory
==9814== 
==9814== Use --track-origins=yes to see where uninitialised values come from
==9814== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9814== 
==9814== 1 errors in context 1 of 2:
==9814== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9814==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9814==    by 0x488CD0: stringsubst (subst.c:301)
==9814==    by 0x48801B: prefork (subst.c:77)
==9814==    by 0x42B318: execcmd (exec.c:2619)
==9814==    by 0x428CA0: execpline2 (exec.c:1697)
==9814==    by 0x427FD2: execpline (exec.c:1484)
==9814==    by 0x427756: execlist (exec.c:1267)
==9814==    by 0x42717C: execode (exec.c:1073)
==9814==    by 0x431299: runshfunc (exec.c:5040)
==9814==    by 0x430E76: doshfunc (exec.c:4920)
==9814==    by 0x4302FB: execshfunc (exec.c:4557)
==9814==    by 0x42D8C1: execcmd (exec.c:3373)
==9814== 
==9814== 
==9814== 2 errors in context 2 of 2:
==9814== Conditional jump or move depends on uninitialised value(s)
==9814==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9814==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9814==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9814==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9814==    by 0x42D8E9: execcmd (exec.c:3378)
==9814==    by 0x428CA0: execpline2 (exec.c:1697)
==9814==    by 0x427FD2: execpline (exec.c:1484)
==9814==    by 0x42779A: execlist (exec.c:1275)
==9814==    by 0x42717C: execode (exec.c:1073)
==9814==    by 0x431299: runshfunc (exec.c:5040)
==9814==    by 0x430E76: doshfunc (exec.c:4920)
==9814==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9814== 
==9814== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9813-- Caught __NR_exit; running __libc_freeres()
--9813-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9813== 
==9813== HEAP SUMMARY:
==9813==     in use at exit: 3,111,946 bytes in 68,921 blocks
==9813==   total heap usage: 1,584,935 allocs, 1,516,014 frees, 127,833,210 bytes allocated
==9813== 
==9813== Searching for pointers to 68,921 not-freed blocks
--9813--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9813--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9813--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9813--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9813--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9813--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9813--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9813--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9813--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9813--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9813--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9813--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9813--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9813--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9813--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9813--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9813--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9813--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9813--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9813--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9813--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9813--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9813--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9813--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9813--   Scanning root segment: 0x701a000..0x701afff (4096)
--9813--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9813--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9813--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9813--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9813--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9813--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9813--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9813--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9813--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9813--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9813== Checked 4,769,672 bytes
==9813== 
==9813== LEAK SUMMARY:
==9813==    definitely lost: 2,189 bytes in 12 blocks
==9813==    indirectly lost: 6,756 bytes in 7 blocks
==9813==      possibly lost: 0 bytes in 0 blocks
==9813==    still reachable: 3,103,001 bytes in 68,902 blocks
==9813==         suppressed: 0 bytes in 0 blocks
==9813== Rerun with --leak-check=full to see details of leaked memory
==9813== 
==9813== Use --track-origins=yes to see where uninitialised values come from
==9813== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9813== 
==9813== 1 errors in context 1 of 2:
==9813== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9813==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9813==    by 0x488CD0: stringsubst (subst.c:301)
==9813==    by 0x48801B: prefork (subst.c:77)
==9813==    by 0x42B318: execcmd (exec.c:2619)
==9813==    by 0x428CA0: execpline2 (exec.c:1697)
==9813==    by 0x427FD2: execpline (exec.c:1484)
==9813==    by 0x427756: execlist (exec.c:1267)
==9813==    by 0x42717C: execode (exec.c:1073)
==9813==    by 0x431299: runshfunc (exec.c:5040)
==9813==    by 0x430E76: doshfunc (exec.c:4920)
==9813==    by 0x4302FB: execshfunc (exec.c:4557)
==9813==    by 0x42D8C1: execcmd (exec.c:3373)
==9813== 
==9813== 
==9813== 2 errors in context 2 of 2:
==9813== Conditional jump or move depends on uninitialised value(s)
==9813==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9813==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9813==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9813==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9813==    by 0x42D8E9: execcmd (exec.c:3378)
==9813==    by 0x428CA0: execpline2 (exec.c:1697)
==9813==    by 0x427FD2: execpline (exec.c:1484)
==9813==    by 0x42779A: execlist (exec.c:1275)
==9813==    by 0x42717C: execode (exec.c:1073)
==9813==    by 0x431299: runshfunc (exec.c:5040)
==9813==    by 0x430E76: doshfunc (exec.c:4920)
==9813==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9813== 
==9813== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--9817-- Caught __NR_exit; running __libc_freeres()
==9817== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9817-by-pythonnut-on-???
==9817== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9817-by-pythonnut-on-???
==9817== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9817-by-pythonnut-on-???
==9817== 
==9817== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9817== don't want to do, unless you know exactly what you're doing,
==9817== or are doing some strange experiment):
==9817==   /usr/lib/valgrind/../../bin/vgdb --pid=9817 ...command...
==9817== 
==9817== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9817==   /path/to/gdb ./zsh
==9817== and then give GDB the following command
==9817==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9817
==9817== --pid is optional if only one valgrind process is running
==9817== 
--9817-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9817== 
==9817== HEAP SUMMARY:
==9817==     in use at exit: 3,112,215 bytes in 68,926 blocks
==9817==   total heap usage: 1,584,946 allocs, 1,516,020 frees, 127,838,304 bytes allocated
==9817== 
==9817== Searching for pointers to 68,926 not-freed blocks
--9817--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9817--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9817--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9817--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9817--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9817--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9817--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9817--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9817--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9817--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9817--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9817--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9817--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9817--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9817--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9817--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9817--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9817--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9817--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9817--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9817--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9817--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9817--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9817--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9817--   Scanning root segment: 0x701a000..0x701afff (4096)
--9817--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9817--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9817--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9817--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9817--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9817--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9817--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9817--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9817--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9817--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9817== Checked 4,769,664 bytes
==9817== 
==9817== LEAK SUMMARY:
==9817==    definitely lost: 2,189 bytes in 12 blocks
==9817==    indirectly lost: 6,756 bytes in 7 blocks
==9817==      possibly lost: 0 bytes in 0 blocks
==9817==    still reachable: 3,103,270 bytes in 68,907 blocks
==9817==         suppressed: 0 bytes in 0 blocks
==9817== Rerun with --leak-check=full to see details of leaked memory
==9817== 
==9817== Use --track-origins=yes to see where uninitialised values come from
==9817== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9817== 
==9817== 1 errors in context 1 of 2:
==9817== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9817==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9817==    by 0x488CD0: stringsubst (subst.c:301)
==9817==    by 0x48801B: prefork (subst.c:77)
==9817==    by 0x42B318: execcmd (exec.c:2619)
==9817==    by 0x428CA0: execpline2 (exec.c:1697)
==9817==    by 0x427FD2: execpline (exec.c:1484)
==9817==    by 0x427756: execlist (exec.c:1267)
==9817==    by 0x42717C: execode (exec.c:1073)
==9817==    by 0x431299: runshfunc (exec.c:5040)
==9817==    by 0x430E76: doshfunc (exec.c:4920)
==9817==    by 0x4302FB: execshfunc (exec.c:4557)
==9817==    by 0x42D8C1: execcmd (exec.c:3373)
==9817== 
==9817== 
==9817== 2 errors in context 2 of 2:
==9817== Conditional jump or move depends on uninitialised value(s)
==9817==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9817==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9817==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9817==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9817==    by 0x42D8E9: execcmd (exec.c:3378)
==9817==    by 0x428CA0: execpline2 (exec.c:1697)
==9817==    by 0x427FD2: execpline (exec.c:1484)
==9817==    by 0x42779A: execlist (exec.c:1275)
==9817==    by 0x42717C: execode (exec.c:1073)
==9817==    by 0x431299: runshfunc (exec.c:5040)
==9817==    by 0x430E76: doshfunc (exec.c:4920)
==9817==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9817== 
==9817== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9819== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9819-by-pythonnut-on-???
==9819== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9819-by-pythonnut-on-???
==9819== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9819-by-pythonnut-on-???
==9819== 
==9819== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9819== don't want to do, unless you know exactly what you're doing,
==9819== or are doing some strange experiment):
==9819==   /usr/lib/valgrind/../../bin/vgdb --pid=9819 ...command...
==9819== 
==9819== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9819==   /path/to/gdb ./zsh
==9819== and then give GDB the following command
==9819==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9819
==9819== --pid is optional if only one valgrind process is running
==9819== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9819-- Caught __NR_exit; running __libc_freeres()
--9819-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9819== 
==9819== HEAP SUMMARY:
==9819==     in use at exit: 3,112,322 bytes in 68,930 blocks
==9819==   total heap usage: 1,584,954 allocs, 1,516,024 frees, 127,840,523 bytes allocated
==9819== 
==9819== Searching for pointers to 68,930 not-freed blocks
--9819--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9819--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9819--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9819--   Scanning root segment: 0x4037000..0x403afff (16384)
--9819--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9819--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9819--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9819--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9819--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9819--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9819--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9819--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9819--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9819--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9819--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9819--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9819--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9819--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9819--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9819--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9819--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9819--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9819--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9819--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9819--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9819--   Scanning root segment: 0x701a000..0x701afff (4096)
--9819--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9819--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9819--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9819--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9819--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9819--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9819--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9819--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9819--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9819--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9819== Checked 4,786,416 bytes
==9819== 
==9819== LEAK SUMMARY:
==9819==    definitely lost: 2,189 bytes in 12 blocks
==9819==    indirectly lost: 6,756 bytes in 7 blocks
==9819==      possibly lost: 0 bytes in 0 blocks
==9819==    still reachable: 3,103,377 bytes in 68,911 blocks
==9819==         suppressed: 0 bytes in 0 blocks
==9819== Rerun with --leak-check=full to see details of leaked memory
==9819== 
==9819== Use --track-origins=yes to see where uninitialised values come from
==9819== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9819== 
==9819== 1 errors in context 1 of 2:
==9819== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9819==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9819==    by 0x488CD0: stringsubst (subst.c:301)
==9819==    by 0x48801B: prefork (subst.c:77)
==9819==    by 0x42B318: execcmd (exec.c:2619)
==9819==    by 0x428CA0: execpline2 (exec.c:1697)
==9819==    by 0x427FD2: execpline (exec.c:1484)
==9819==    by 0x427756: execlist (exec.c:1267)
==9819==    by 0x42717C: execode (exec.c:1073)
==9819==    by 0x431299: runshfunc (exec.c:5040)
==9819==    by 0x430E76: doshfunc (exec.c:4920)
==9819==    by 0x4302FB: execshfunc (exec.c:4557)
==9819==    by 0x42D8C1: execcmd (exec.c:3373)
==9819== 
==9819== 
==9819== 2 errors in context 2 of 2:
==9819== Conditional jump or move depends on uninitialised value(s)
==9819==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9819==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9819==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9819==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9819==    by 0x42D8E9: execcmd (exec.c:3378)
==9819==    by 0x428CA0: execpline2 (exec.c:1697)
==9819==    by 0x427FD2: execpline (exec.c:1484)
==9819==    by 0x42779A: execlist (exec.c:1275)
==9819==    by 0x42717C: execode (exec.c:1073)
==9819==    by 0x431299: runshfunc (exec.c:5040)
==9819==    by 0x430E76: doshfunc (exec.c:4920)
==9819==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9819== 
==9819== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--9823-- Caught __NR_exit; running __libc_freeres()
==9823== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9823-by-pythonnut-on-???
==9823== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9823-by-pythonnut-on-???
==9823== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9823-by-pythonnut-on-???
==9823== 
==9823== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9823== don't want to do, unless you know exactly what you're doing,
==9823== or are doing some strange experiment):
==9823==   /usr/lib/valgrind/../../bin/vgdb --pid=9823 ...command...
==9823== 
==9823== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9823==   /path/to/gdb ./zsh
==9823== and then give GDB the following command
==9823==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9823
==9823== --pid is optional if only one valgrind process is running
==9823== 
--9823-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9823== 
==9823== HEAP SUMMARY:
==9823==     in use at exit: 3,111,612 bytes in 68,915 blocks
==9823==   total heap usage: 1,585,004 allocs, 1,516,089 frees, 127,846,992 bytes allocated
==9823== 
==9823== Searching for pointers to 68,915 not-freed blocks
--9823--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9823--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9823--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9823--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9823--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9823--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9823--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9823--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9823--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9823--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9823--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9823--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9823--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9823--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9823--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9823--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9823--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9823--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9823--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9823--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9823--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9823--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9823--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9823--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9823--   Scanning root segment: 0x701a000..0x701afff (4096)
--9823--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9823--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9823--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9823--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9823--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9823--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9823--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9823--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9823--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9823--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9823== Checked 4,786,576 bytes
==9823== 
==9823== LEAK SUMMARY:
==9823==    definitely lost: 2,189 bytes in 12 blocks
==9823==    indirectly lost: 6,756 bytes in 7 blocks
==9823==      possibly lost: 0 bytes in 0 blocks
==9823==    still reachable: 3,102,667 bytes in 68,896 blocks
==9823==         suppressed: 0 bytes in 0 blocks
==9823== Rerun with --leak-check=full to see details of leaked memory
==9823== 
==9823== Use --track-origins=yes to see where uninitialised values come from
==9823== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9823== 
==9823== 1 errors in context 1 of 2:
==9823== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9823==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9823==    by 0x488CD0: stringsubst (subst.c:301)
==9823==    by 0x48801B: prefork (subst.c:77)
==9823==    by 0x42B318: execcmd (exec.c:2619)
==9823==    by 0x428CA0: execpline2 (exec.c:1697)
==9823==    by 0x427FD2: execpline (exec.c:1484)
==9823==    by 0x427756: execlist (exec.c:1267)
==9823==    by 0x42717C: execode (exec.c:1073)
==9823==    by 0x431299: runshfunc (exec.c:5040)
==9823==    by 0x430E76: doshfunc (exec.c:4920)
==9823==    by 0x4302FB: execshfunc (exec.c:4557)
==9823==    by 0x42D8C1: execcmd (exec.c:3373)
==9823== 
==9823== 
==9823== 2 errors in context 2 of 2:
==9823== Conditional jump or move depends on uninitialised value(s)
==9823==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9823==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9823==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9823==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9823==    by 0x42D8E9: execcmd (exec.c:3378)
==9823==    by 0x428CA0: execpline2 (exec.c:1697)
==9823==    by 0x427FD2: execpline (exec.c:1484)
==9823==    by 0x42779A: execlist (exec.c:1275)
==9823==    by 0x42717C: execode (exec.c:1073)
==9823==    by 0x431299: runshfunc (exec.c:5040)
==9823==    by 0x430E76: doshfunc (exec.c:4920)
==9823==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9823== 
==9823== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9824== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9824-by-pythonnut-on-???
==9824== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9824-by-pythonnut-on-???
==9824== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9824-by-pythonnut-on-???
==9824== 
==9824== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9824== don't want to do, unless you know exactly what you're doing,
==9824== or are doing some strange experiment):
==9824==   /usr/lib/valgrind/../../bin/vgdb --pid=9824 ...command...
==9824== 
==9824== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9824==   /path/to/gdb ./zsh
==9824== and then give GDB the following command
==9824==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9824
==9824== --pid is optional if only one valgrind process is running
==9824== 
--9824-- Caught __NR_exit; running __libc_freeres()
--9824-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9824== 
==9824== HEAP SUMMARY:
==9824==     in use at exit: 3,113,041 bytes in 68,962 blocks
==9824==   total heap usage: 1,585,096 allocs, 1,516,134 frees, 127,855,102 bytes allocated
==9824== 
==9824== Searching for pointers to 68,962 not-freed blocks
--9824--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9824--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9824--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9824--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9824--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9824--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9824--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9824--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9824--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9824--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9824--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9824--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9824--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9824--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9824--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9824--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9824--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9824--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9824--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9824--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9824--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9824--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9824--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9824--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9824--   Scanning root segment: 0x701a000..0x701afff (4096)
--9824--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9824--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9824--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9824--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9824--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9824--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9824--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9824--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9824--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9824--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9824== Checked 4,767,064 bytes
==9824== 
==9824== LEAK SUMMARY:
==9824==    definitely lost: 2,189 bytes in 12 blocks
==9824==    indirectly lost: 6,756 bytes in 7 blocks
==9824==      possibly lost: 0 bytes in 0 blocks
==9824==    still reachable: 3,104,096 bytes in 68,943 blocks
==9824==         suppressed: 0 bytes in 0 blocks
==9824== Rerun with --leak-check=full to see details of leaked memory
==9824== 
==9824== Use --track-origins=yes to see where uninitialised values come from
==9824== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9824== 
==9824== 1 errors in context 1 of 2:
==9824== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9824==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9824==    by 0x488CD0: stringsubst (subst.c:301)
==9824==    by 0x48801B: prefork (subst.c:77)
==9824==    by 0x42B318: execcmd (exec.c:2619)
==9824==    by 0x428CA0: execpline2 (exec.c:1697)
==9824==    by 0x427FD2: execpline (exec.c:1484)
==9824==    by 0x427756: execlist (exec.c:1267)
==9824==    by 0x42717C: execode (exec.c:1073)
==9824==    by 0x431299: runshfunc (exec.c:5040)
==9824==    by 0x430E76: doshfunc (exec.c:4920)
==9824==    by 0x4302FB: execshfunc (exec.c:4557)
==9824==    by 0x42D8C1: execcmd (exec.c:3373)
==9824== 
==9824== 
==9824== 2 errors in context 2 of 2:
==9824== Conditional jump or move depends on uninitialised value(s)
==9824==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9824==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9824==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9824==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9824==    by 0x42D8E9: execcmd (exec.c:3378)
==9824==    by 0x428CA0: execpline2 (exec.c:1697)
==9824==    by 0x427FD2: execpline (exec.c:1484)
==9824==    by 0x42779A: execlist (exec.c:1275)
==9824==    by 0x42717C: execode (exec.c:1073)
==9824==    by 0x431299: runshfunc (exec.c:5040)
==9824==    by 0x430E76: doshfunc (exec.c:4920)
==9824==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9824== 
==9824== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9827== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9827-by-pythonnut-on-???
==9827== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9827-by-pythonnut-on-???
==9827== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9827-by-pythonnut-on-???
==9827== 
==9827== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9827== don't want to do, unless you know exactly what you're doing,
==9827== or are doing some strange experiment):
==9827==   /usr/lib/valgrind/../../bin/vgdb --pid=9827 ...command...
==9827== 
==9827== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9827==   /path/to/gdb ./zsh
==9827== and then give GDB the following command
==9827==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9827
==9827== --pid is optional if only one valgrind process is running
==9827== 
==9828== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9828-by-pythonnut-on-???
==9828== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9828-by-pythonnut-on-???
==9828== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9828-by-pythonnut-on-???
==9828== 
==9828== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9828== don't want to do, unless you know exactly what you're doing,
==9828== or are doing some strange experiment):
==9828==   /usr/lib/valgrind/../../bin/vgdb --pid=9828 ...command...
==9828== 
==9828== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9828==   /path/to/gdb ./zsh
==9828== and then give GDB the following command
==9828==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9828
==9828== --pid is optional if only one valgrind process is running
==9828== 
==9829== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9829-by-pythonnut-on-???
==9829== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9829-by-pythonnut-on-???
==9829== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9829-by-pythonnut-on-???
==9829== 
==9829== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9829== don't want to do, unless you know exactly what you're doing,
==9829== or are doing some strange experiment):
==9829==   /usr/lib/valgrind/../../bin/vgdb --pid=9829 ...command...
==9829== 
==9829== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9829==   /path/to/gdb ./zsh
==9829== and then give GDB the following command
==9829==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9829
==9829== --pid is optional if only one valgrind process is running
==9829== 
client request: code 4d430005,  addr 0xFFEFF0B2C,  len 4
--9829-- Caught __NR_exit; running __libc_freeres()
--9829-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9829== 
==9829== HEAP SUMMARY:
==9829==     in use at exit: 3,116,830 bytes in 69,028 blocks
==9829==   total heap usage: 1,585,237 allocs, 1,516,209 frees, 127,886,085 bytes allocated
==9829== 
==9829== Searching for pointers to 69,028 not-freed blocks
--9829--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9829--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9829--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9829--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9829--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9829--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9829--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9829--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9829--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9829--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9829--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9829--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9829--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9829--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9829--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9829--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9829--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9829--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9829--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9829--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9829--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9829--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9829--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9829--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9829--   Scanning root segment: 0x701a000..0x701afff (4096)
--9829--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9829--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9829--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9829--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9829--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9829--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9829--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9829--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9829--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9829--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9829== Checked 4,774,480 bytes
==9829== 
==9829== LEAK SUMMARY:
==9829==    definitely lost: 2,189 bytes in 12 blocks
==9829==    indirectly lost: 6,756 bytes in 7 blocks
==9829==      possibly lost: 0 bytes in 0 blocks
==9829==    still reachable: 3,107,885 bytes in 69,009 blocks
==9829==         suppressed: 0 bytes in 0 blocks
==9829== Rerun with --leak-check=full to see details of leaked memory
==9829== 
==9829== Use --track-origins=yes to see where uninitialised values come from
==9829== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9829== 
==9829== 1 errors in context 1 of 2:
==9829== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9829==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9829==    by 0x488CD0: stringsubst (subst.c:301)
==9829==    by 0x48801B: prefork (subst.c:77)
==9829==    by 0x42B318: execcmd (exec.c:2619)
==9829==    by 0x428CA0: execpline2 (exec.c:1697)
==9829==    by 0x427FD2: execpline (exec.c:1484)
==9829==    by 0x427756: execlist (exec.c:1267)
==9829==    by 0x42717C: execode (exec.c:1073)
==9829==    by 0x431299: runshfunc (exec.c:5040)
==9829==    by 0x430E76: doshfunc (exec.c:4920)
==9829==    by 0x4302FB: execshfunc (exec.c:4557)
==9829==    by 0x42D8C1: execcmd (exec.c:3373)
==9829== 
==9829== 
==9829== 2 errors in context 2 of 2:
==9829== Conditional jump or move depends on uninitialised value(s)
==9829==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9829==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9829==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9829==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9829==    by 0x42D8E9: execcmd (exec.c:3378)
==9829==    by 0x428CA0: execpline2 (exec.c:1697)
==9829==    by 0x427FD2: execpline (exec.c:1484)
==9829==    by 0x42779A: execlist (exec.c:1275)
==9829==    by 0x42717C: execode (exec.c:1073)
==9829==    by 0x431299: runshfunc (exec.c:5040)
==9829==    by 0x430E76: doshfunc (exec.c:4920)
==9829==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9829== 
==9829== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9832-- Caught __NR_exit; running __libc_freeres()
==9832== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9832-by-pythonnut-on-???
==9832== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9832-by-pythonnut-on-???
==9832== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9832-by-pythonnut-on-???
==9832== 
==9832== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9832== don't want to do, unless you know exactly what you're doing,
==9832== or are doing some strange experiment):
==9832==   /usr/lib/valgrind/../../bin/vgdb --pid=9832 ...command...
==9832== 
==9832== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9832==   /path/to/gdb ./zsh
==9832== and then give GDB the following command
==9832==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9832
==9832== --pid is optional if only one valgrind process is running
==9832== 
==9833== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9833-by-pythonnut-on-???
==9833== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9833-by-pythonnut-on-???
==9833== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9833-by-pythonnut-on-???
==9833== 
==9833== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9833== don't want to do, unless you know exactly what you're doing,
==9833== or are doing some strange experiment):
==9833==   /usr/lib/valgrind/../../bin/vgdb --pid=9833 ...command...
==9833== 
==9833== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9833==   /path/to/gdb ./zsh
==9833== and then give GDB the following command
==9833==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9833
==9833== --pid is optional if only one valgrind process is running
==9833== 
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9832-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9832== 
==9832== HEAP SUMMARY:
==9832==     in use at exit: 3,153,721 bytes in 69,036 blocks
==9832==   total heap usage: 1,585,245 allocs, 1,516,209 frees, 127,926,032 bytes allocated
==9832== 
==9832== Searching for pointers to 69,036 not-freed blocks
--9832--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9832--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9832--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9832--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9832--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9832--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9832--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9832--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9832--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9832--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9832--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9832--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9832--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9832--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9832--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9832--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9832--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9832--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9832--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9832--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9832--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9832--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9832--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9832--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9832--   Scanning root segment: 0x701a000..0x701afff (4096)
--9832--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9832--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9832--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9832--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9832--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9832--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9832--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9832--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9832--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9832--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9832== Checked 4,886,288 bytes
==9832== 
==9832== LEAK SUMMARY:
==9832==    definitely lost: 2,189 bytes in 12 blocks
==9832==    indirectly lost: 6,756 bytes in 7 blocks
==9832==      possibly lost: 0 bytes in 0 blocks
==9832==    still reachable: 3,144,776 bytes in 69,017 blocks
==9832==         suppressed: 0 bytes in 0 blocks
==9832== Rerun with --leak-check=full to see details of leaked memory
==9832== 
==9832== Use --track-origins=yes to see where uninitialised values come from
==9832== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9832== 
==9832== 1 errors in context 1 of 2:
==9832== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9832==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9832==    by 0x488CD0: stringsubst (subst.c:301)
==9832==    by 0x48801B: prefork (subst.c:77)
==9832==    by 0x42B318: execcmd (exec.c:2619)
==9832==    by 0x428CA0: execpline2 (exec.c:1697)
==9832==    by 0x427FD2: execpline (exec.c:1484)
==9832==    by 0x427756: execlist (exec.c:1267)
==9832==    by 0x42717C: execode (exec.c:1073)
==9832==    by 0x431299: runshfunc (exec.c:5040)
==9832==    by 0x430E76: doshfunc (exec.c:4920)
==9832==    by 0x4302FB: execshfunc (exec.c:4557)
==9832==    by 0x42D8C1: execcmd (exec.c:3373)
==9832== 
==9832== 
==9832== 2 errors in context 2 of 2:
==9832== Conditional jump or move depends on uninitialised value(s)
==9832==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9832==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9832==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9832==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9832==    by 0x42D8E9: execcmd (exec.c:3378)
==9832==    by 0x428CA0: execpline2 (exec.c:1697)
==9832==    by 0x427FD2: execpline (exec.c:1484)
==9832==    by 0x42779A: execlist (exec.c:1275)
==9832==    by 0x42717C: execode (exec.c:1073)
==9832==    by 0x431299: runshfunc (exec.c:5040)
==9832==    by 0x430E76: doshfunc (exec.c:4920)
==9832==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9832== 
==9832== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9831== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9831-by-pythonnut-on-???
==9831== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9831-by-pythonnut-on-???
==9831== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9831-by-pythonnut-on-???
==9831== 
==9831== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9831== don't want to do, unless you know exactly what you're doing,
==9831== or are doing some strange experiment):
==9831==   /usr/lib/valgrind/../../bin/vgdb --pid=9831 ...command...
==9831== 
==9831== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9831==   /path/to/gdb ./zsh
==9831== and then give GDB the following command
==9831==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9831
==9831== --pid is optional if only one valgrind process is running
==9831== 
--9831-- Caught __NR_exit; running __libc_freeres()
--9831-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9831== 
==9831== HEAP SUMMARY:
==9831==     in use at exit: 3,153,657 bytes in 69,033 blocks
==9831==   total heap usage: 1,585,247 allocs, 1,516,214 frees, 127,926,576 bytes allocated
==9831== 
==9831== Searching for pointers to 69,033 not-freed blocks
--9831--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9831--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9831--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9831--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9831--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9831--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9831--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9831--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9831--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9831--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9831--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9831--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9831--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9831--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9831--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9831--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9831--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9831--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9831--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9831--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9831--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9831--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9831--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9831--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9831--   Scanning root segment: 0x701a000..0x701afff (4096)
--9831--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9831--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9831--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9831--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9831--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9831--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9831--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9831--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9831--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9831--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9831== Checked 4,885,616 bytes
==9831== 
==9831== LEAK SUMMARY:
==9831==    definitely lost: 2,189 bytes in 12 blocks
==9831==    indirectly lost: 6,756 bytes in 7 blocks
==9831==      possibly lost: 0 bytes in 0 blocks
==9831==    still reachable: 3,144,712 bytes in 69,014 blocks
==9831==         suppressed: 0 bytes in 0 blocks
==9831== Rerun with --leak-check=full to see details of leaked memory
==9831== 
==9831== Use --track-origins=yes to see where uninitialised values come from
==9831== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9831== 
==9831== 1 errors in context 1 of 2:
==9831== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9831==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9831==    by 0x488CD0: stringsubst (subst.c:301)
==9831==    by 0x48801B: prefork (subst.c:77)
==9831==    by 0x42B318: execcmd (exec.c:2619)
==9831==    by 0x428CA0: execpline2 (exec.c:1697)
==9831==    by 0x427FD2: execpline (exec.c:1484)
==9831==    by 0x427756: execlist (exec.c:1267)
==9831==    by 0x42717C: execode (exec.c:1073)
==9831==    by 0x431299: runshfunc (exec.c:5040)
==9831==    by 0x430E76: doshfunc (exec.c:4920)
==9831==    by 0x4302FB: execshfunc (exec.c:4557)
==9831==    by 0x42D8C1: execcmd (exec.c:3373)
==9831== 
==9831== 
==9831== 2 errors in context 2 of 2:
==9831== Conditional jump or move depends on uninitialised value(s)
==9831==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9831==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9831==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9831==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9831==    by 0x42D8E9: execcmd (exec.c:3378)
==9831==    by 0x428CA0: execpline2 (exec.c:1697)
==9831==    by 0x427FD2: execpline (exec.c:1484)
==9831==    by 0x42779A: execlist (exec.c:1275)
==9831==    by 0x42717C: execode (exec.c:1073)
==9831==    by 0x431299: runshfunc (exec.c:5040)
==9831==    by 0x430E76: doshfunc (exec.c:4920)
==9831==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9831== 
==9831== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9834== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9834-by-pythonnut-on-???
==9834== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9834-by-pythonnut-on-???
==9834== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9834-by-pythonnut-on-???
==9834== 
==9834== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9834== don't want to do, unless you know exactly what you're doing,
==9834== or are doing some strange experiment):
==9834==   /usr/lib/valgrind/../../bin/vgdb --pid=9834 ...command...
==9834== 
==9834== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9834==   /path/to/gdb ./zsh
==9834== and then give GDB the following command
==9834==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9834
==9834== --pid is optional if only one valgrind process is running
==9834== 
==9835== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9835-by-pythonnut-on-???
==9835== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9835-by-pythonnut-on-???
==9835== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9835-by-pythonnut-on-???
==9835== 
==9835== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9835== don't want to do, unless you know exactly what you're doing,
==9835== or are doing some strange experiment):
==9835==   /usr/lib/valgrind/../../bin/vgdb --pid=9835 ...command...
==9835== 
==9835== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9835==   /path/to/gdb ./zsh
==9835== and then give GDB the following command
==9835==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9835
==9835== --pid is optional if only one valgrind process is running
==9835== 
--9835-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9835-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9835== 
==9835== HEAP SUMMARY:
==9835==     in use at exit: 3,190,371 bytes in 69,039 blocks
==9835==   total heap usage: 1,585,254 allocs, 1,516,215 frees, 127,964,867 bytes allocated
==9835== 
==9835== Searching for pointers to 69,039 not-freed blocks
--9835--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9835--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9835--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9835--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9835--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9835--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9835--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9835--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9835--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9835--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9835--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9835--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9835--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9835--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9835--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9835--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9835--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9835--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9835--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9835--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9835--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9835--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9835--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9835--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9835--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9835--   Scanning root segment: 0x701a000..0x701afff (4096)
--9835--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9835--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9835--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9835--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9835--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9835--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9835--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9835--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9835--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9835--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9835== Checked 4,959,800 bytes
==9835== 
==9835== LEAK SUMMARY:
==9835==    definitely lost: 2,189 bytes in 12 blocks
==9835==    indirectly lost: 6,756 bytes in 7 blocks
==9835==      possibly lost: 0 bytes in 0 blocks
==9835==    still reachable: 3,181,426 bytes in 69,020 blocks
==9835==         suppressed: 0 bytes in 0 blocks
==9835== Rerun with --leak-check=full to see details of leaked memory
==9835== 
==9835== Use --track-origins=yes to see where uninitialised values come from
==9835== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9835== 
==9835== 1 errors in context 1 of 2:
==9835== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9835==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9835==    by 0x488CD0: stringsubst (subst.c:301)
==9835==    by 0x48801B: prefork (subst.c:77)
==9835==    by 0x42B318: execcmd (exec.c:2619)
==9835==    by 0x428CA0: execpline2 (exec.c:1697)
==9835==    by 0x427FD2: execpline (exec.c:1484)
==9835==    by 0x427756: execlist (exec.c:1267)
==9835==    by 0x42717C: execode (exec.c:1073)
==9835==    by 0x431299: runshfunc (exec.c:5040)
==9835==    by 0x430E76: doshfunc (exec.c:4920)
==9835==    by 0x4302FB: execshfunc (exec.c:4557)
==9835==    by 0x42D8C1: execcmd (exec.c:3373)
==9835== 
==9835== 
==9835== 2 errors in context 2 of 2:
==9835== Conditional jump or move depends on uninitialised value(s)
==9835==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9835==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9835==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9835==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9835==    by 0x42D8E9: execcmd (exec.c:3378)
==9835==    by 0x428CA0: execpline2 (exec.c:1697)
==9835==    by 0x427FD2: execpline (exec.c:1484)
==9835==    by 0x42779A: execlist (exec.c:1275)
==9835==    by 0x42717C: execode (exec.c:1073)
==9835==    by 0x431299: runshfunc (exec.c:5040)
==9835==    by 0x430E76: doshfunc (exec.c:4920)
==9835==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9835== 
==9835== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9834-- Caught __NR_exit; running __libc_freeres()
--9834-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9834== 
==9834== HEAP SUMMARY:
==9834==     in use at exit: 3,153,731 bytes in 69,036 blocks
==9834==   total heap usage: 1,585,257 allocs, 1,516,221 frees, 127,965,443 bytes allocated
==9834== 
==9834== Searching for pointers to 69,036 not-freed blocks
--9834--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9834--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9834--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9834--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9834--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9834--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9834--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9834--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9834--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9834--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9834--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9834--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9834--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9834--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9834--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9834--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9834--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9834--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9834--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9834--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9834--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9834--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9834--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9834--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9834--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9834--   Scanning root segment: 0x701a000..0x701afff (4096)
--9834--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9834--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9834--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9834--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9834--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9834--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9834--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9834--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9834--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9834--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9834== Checked 4,922,544 bytes
==9834== 
==9834== LEAK SUMMARY:
==9834==    definitely lost: 2,189 bytes in 12 blocks
==9834==    indirectly lost: 6,756 bytes in 7 blocks
==9834==      possibly lost: 0 bytes in 0 blocks
==9834==    still reachable: 3,144,786 bytes in 69,017 blocks
==9834==         suppressed: 0 bytes in 0 blocks
==9834== Rerun with --leak-check=full to see details of leaked memory
==9834== 
==9834== Use --track-origins=yes to see where uninitialised values come from
==9834== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9834== 
==9834== 1 errors in context 1 of 2:
==9834== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9834==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9834==    by 0x488CD0: stringsubst (subst.c:301)
==9834==    by 0x48801B: prefork (subst.c:77)
==9834==    by 0x42B318: execcmd (exec.c:2619)
==9834==    by 0x428CA0: execpline2 (exec.c:1697)
==9834==    by 0x427FD2: execpline (exec.c:1484)
==9834==    by 0x427756: execlist (exec.c:1267)
==9834==    by 0x42717C: execode (exec.c:1073)
==9834==    by 0x431299: runshfunc (exec.c:5040)
==9834==    by 0x430E76: doshfunc (exec.c:4920)
==9834==    by 0x4302FB: execshfunc (exec.c:4557)
==9834==    by 0x42D8C1: execcmd (exec.c:3373)
==9834== 
==9834== 
==9834== 2 errors in context 2 of 2:
==9834== Conditional jump or move depends on uninitialised value(s)
==9834==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9834==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9834==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9834==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9834==    by 0x42D8E9: execcmd (exec.c:3378)
==9834==    by 0x428CA0: execpline2 (exec.c:1697)
==9834==    by 0x427FD2: execpline (exec.c:1484)
==9834==    by 0x42779A: execlist (exec.c:1275)
==9834==    by 0x42717C: execode (exec.c:1073)
==9834==    by 0x431299: runshfunc (exec.c:5040)
==9834==    by 0x430E76: doshfunc (exec.c:4920)
==9834==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9834== 
==9834== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9839== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9839-by-pythonnut-on-???
==9839== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9839-by-pythonnut-on-???
==9839== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9839-by-pythonnut-on-???
==9839== 
==9839== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9839== don't want to do, unless you know exactly what you're doing,
==9839== or are doing some strange experiment):
==9839==   /usr/lib/valgrind/../../bin/vgdb --pid=9839 ...command...
==9839== 
==9839== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9839==   /path/to/gdb ./zsh
==9839== and then give GDB the following command
==9839==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9839
==9839== --pid is optional if only one valgrind process is running
==9839== 
--9840-- Caught __NR_exit; running __libc_freeres()
==9840== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9840-by-pythonnut-on-???
==9840== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9840-by-pythonnut-on-???
==9840== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9840-by-pythonnut-on-???
==9840== 
==9840== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9840== don't want to do, unless you know exactly what you're doing,
==9840== or are doing some strange experiment):
==9840==   /usr/lib/valgrind/../../bin/vgdb --pid=9840 ...command...
==9840== 
==9840== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9840==   /path/to/gdb ./zsh
==9840== and then give GDB the following command
==9840==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9840
==9840== --pid is optional if only one valgrind process is running
==9840== 
--9840-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9840== 
==9840== HEAP SUMMARY:
==9840==     in use at exit: 3,154,587 bytes in 69,042 blocks
==9840==   total heap usage: 1,585,266 allocs, 1,516,224 frees, 127,933,155 bytes allocated
==9840== 
==9840== Searching for pointers to 69,042 not-freed blocks
--9840--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9840--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9840--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9840--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9840--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9840--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9840--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9840--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9840--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9840--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9840--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9840--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9840--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9840--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9840--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9840--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9840--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9840--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9840--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9840--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9840--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9840--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9840--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9840--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9840--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9840--   Scanning root segment: 0x701a000..0x701afff (4096)
--9840--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9840--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9840--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9840--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9840--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9840--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9840--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9840--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9840--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9840--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9840== Checked 4,903,240 bytes
==9840== 
==9840== LEAK SUMMARY:
==9840==    definitely lost: 2,189 bytes in 12 blocks
==9840==    indirectly lost: 6,756 bytes in 7 blocks
==9840==      possibly lost: 0 bytes in 0 blocks
==9840==    still reachable: 3,145,642 bytes in 69,023 blocks
==9840==         suppressed: 0 bytes in 0 blocks
==9840== Rerun with --leak-check=full to see details of leaked memory
==9840== 
==9840== Use --track-origins=yes to see where uninitialised values come from
==9840== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9840== 
==9840== 1 errors in context 1 of 2:
==9840== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9840==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9840==    by 0x488CD0: stringsubst (subst.c:301)
==9840==    by 0x48801B: prefork (subst.c:77)
==9840==    by 0x42B318: execcmd (exec.c:2619)
==9840==    by 0x428CA0: execpline2 (exec.c:1697)
==9840==    by 0x427FD2: execpline (exec.c:1484)
==9840==    by 0x427756: execlist (exec.c:1267)
==9840==    by 0x42717C: execode (exec.c:1073)
==9840==    by 0x431299: runshfunc (exec.c:5040)
==9840==    by 0x430E76: doshfunc (exec.c:4920)
==9840==    by 0x4302FB: execshfunc (exec.c:4557)
==9840==    by 0x42D8C1: execcmd (exec.c:3373)
==9840== 
==9840== 
==9840== 2 errors in context 2 of 2:
==9840== Conditional jump or move depends on uninitialised value(s)
==9840==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9840==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9840==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9840==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9840==    by 0x42D8E9: execcmd (exec.c:3378)
==9840==    by 0x428CA0: execpline2 (exec.c:1697)
==9840==    by 0x427FD2: execpline (exec.c:1484)
==9840==    by 0x42779A: execlist (exec.c:1275)
==9840==    by 0x42717C: execode (exec.c:1073)
==9840==    by 0x431299: runshfunc (exec.c:5040)
==9840==    by 0x430E76: doshfunc (exec.c:4920)
==9840==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9840== 
==9840== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9839-- Caught __NR_exit; running __libc_freeres()
--9839-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9839== 
==9839== HEAP SUMMARY:
==9839==     in use at exit: 3,154,352 bytes in 69,042 blocks
==9839==   total heap usage: 1,585,303 allocs, 1,516,261 frees, 127,942,664 bytes allocated
==9839== 
==9839== Searching for pointers to 69,042 not-freed blocks
--9839--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9839--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9839--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9839--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9839--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9839--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9839--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9839--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9839--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9839--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9839--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9839--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9839--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9839--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9839--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9839--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9839--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9839--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9839--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9839--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9839--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9839--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9839--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9839--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9839--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9839--   Scanning root segment: 0x701a000..0x701afff (4096)
--9839--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9839--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9839--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9839--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9839--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9839--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9839--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9839--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9839--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9839--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9839== Checked 4,902,440 bytes
==9839== 
==9839== LEAK SUMMARY:
==9839==    definitely lost: 2,189 bytes in 12 blocks
==9839==    indirectly lost: 6,756 bytes in 7 blocks
==9839==      possibly lost: 0 bytes in 0 blocks
==9839==    still reachable: 3,145,407 bytes in 69,023 blocks
==9839==         suppressed: 0 bytes in 0 blocks
==9839== Rerun with --leak-check=full to see details of leaked memory
==9839== 
==9839== Use --track-origins=yes to see where uninitialised values come from
==9839== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9839== 
==9839== 1 errors in context 1 of 2:
==9839== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9839==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9839==    by 0x488CD0: stringsubst (subst.c:301)
==9839==    by 0x48801B: prefork (subst.c:77)
==9839==    by 0x42B318: execcmd (exec.c:2619)
==9839==    by 0x428CA0: execpline2 (exec.c:1697)
==9839==    by 0x427FD2: execpline (exec.c:1484)
==9839==    by 0x427756: execlist (exec.c:1267)
==9839==    by 0x42717C: execode (exec.c:1073)
==9839==    by 0x431299: runshfunc (exec.c:5040)
==9839==    by 0x430E76: doshfunc (exec.c:4920)
==9839==    by 0x4302FB: execshfunc (exec.c:4557)
==9839==    by 0x42D8C1: execcmd (exec.c:3373)
==9839== 
==9839== 
==9839== 2 errors in context 2 of 2:
==9839== Conditional jump or move depends on uninitialised value(s)
==9839==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9839==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9839==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9839==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9839==    by 0x42D8E9: execcmd (exec.c:3378)
==9839==    by 0x428CA0: execpline2 (exec.c:1697)
==9839==    by 0x427FD2: execpline (exec.c:1484)
==9839==    by 0x42779A: execlist (exec.c:1275)
==9839==    by 0x42717C: execode (exec.c:1073)
==9839==    by 0x431299: runshfunc (exec.c:5040)
==9839==    by 0x430E76: doshfunc (exec.c:4920)
==9839==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9839== 
==9839== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9841-- Caught __NR_exit; running __libc_freeres()
==9841== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9841-by-pythonnut-on-???
==9841== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9841-by-pythonnut-on-???
==9841== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9841-by-pythonnut-on-???
==9841== 
==9841== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9841== don't want to do, unless you know exactly what you're doing,
==9841== or are doing some strange experiment):
==9841==   /usr/lib/valgrind/../../bin/vgdb --pid=9841 ...command...
==9841== 
==9841== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9841==   /path/to/gdb ./zsh
==9841== and then give GDB the following command
==9841==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9841
==9841== --pid is optional if only one valgrind process is running
==9841== 
client request: code 4d430005,  addr 0xFFEFF1DAC,  len 4
--9841-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9841== 
--9842-- Caught __NR_exit; running __libc_freeres()
==9841== HEAP SUMMARY:
==9841==     in use at exit: 3,117,401 bytes in 69,042 blocks
==9841==   total heap usage: 1,585,275 allocs, 1,516,233 frees, 127,936,575 bytes allocated
==9841== 
==9842== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9842-by-pythonnut-on-???
==9842== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9842-by-pythonnut-on-???
==9842== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9842-by-pythonnut-on-???
==9842== 
==9842== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9842== don't want to do, unless you know exactly what you're doing,
==9842== or are doing some strange experiment):
==9842==   /usr/lib/valgrind/../../bin/vgdb --pid=9842 ...command...
==9842== 
==9842== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9842==   /path/to/gdb ./zsh
==9842== and then give GDB the following command
==9842==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9842
==9842== --pid is optional if only one valgrind process is running
==9842== 
==9841== Searching for pointers to 69,042 not-freed blocks
--9841--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9841--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9841--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9841--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9841--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9841--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9841--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9841--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9841--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9841--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9841--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9841--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9841--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9841--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9841--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9841--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9841--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9841--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9841--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9841--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9841--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9841--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9841--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9841--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9841--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9841--   Scanning root segment: 0x701a000..0x701afff (4096)
--9841--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9841--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9841--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9841--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9841--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9841--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9841--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9841--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9841--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9841--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9842-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9842== 
==9842== HEAP SUMMARY:
==9842==     in use at exit: 3,117,401 bytes in 69,042 blocks
==9842==   total heap usage: 1,585,280 allocs, 1,516,238 frees, 127,938,663 bytes allocated
==9842== 
==9842== Searching for pointers to 69,042 not-freed blocks
--9842--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9842--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9842--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9842--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9842--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9842--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9842--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9842--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9842--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9842--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9842--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9842--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9842--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9842--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9842--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9842--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9842--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9842--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9842--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9842--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9842--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9842--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9842--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9842--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9842--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9842--   Scanning root segment: 0x701a000..0x701afff (4096)
--9842--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9842--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9842--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9842--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9842--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9842--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9842--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9842--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9842--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9842--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9841== Checked 4,865,048 bytes
==9841== 
==9841== LEAK SUMMARY:
==9841==    definitely lost: 2,189 bytes in 12 blocks
==9841==    indirectly lost: 6,756 bytes in 7 blocks
==9841==      possibly lost: 0 bytes in 0 blocks
==9841==    still reachable: 3,108,456 bytes in 69,023 blocks
==9841==         suppressed: 0 bytes in 0 blocks
==9841== Rerun with --leak-check=full to see details of leaked memory
==9841== 
==9841== Use --track-origins=yes to see where uninitialised values come from
==9841== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9841== 
==9841== 1 errors in context 1 of 2:
==9841== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9841==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9841==    by 0x488CD0: stringsubst (subst.c:301)
==9841==    by 0x48801B: prefork (subst.c:77)
==9841==    by 0x42B318: execcmd (exec.c:2619)
==9841==    by 0x428CA0: execpline2 (exec.c:1697)
==9841==    by 0x427FD2: execpline (exec.c:1484)
==9841==    by 0x427756: execlist (exec.c:1267)
==9841==    by 0x42717C: execode (exec.c:1073)
==9841==    by 0x431299: runshfunc (exec.c:5040)
==9841==    by 0x430E76: doshfunc (exec.c:4920)
==9841==    by 0x4302FB: execshfunc (exec.c:4557)
==9841==    by 0x42D8C1: execcmd (exec.c:3373)
==9841== 
==9841== 
==9841== 2 errors in context 2 of 2:
==9841== Conditional jump or move depends on uninitialised value(s)
==9841==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9841==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9841==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9841==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9841==    by 0x42D8E9: execcmd (exec.c:3378)
==9841==    by 0x428CA0: execpline2 (exec.c:1697)
==9841==    by 0x427FD2: execpline (exec.c:1484)
==9841==    by 0x42779A: execlist (exec.c:1275)
==9841==    by 0x42717C: execode (exec.c:1073)
==9841==    by 0x431299: runshfunc (exec.c:5040)
==9841==    by 0x430E76: doshfunc (exec.c:4920)
==9841==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9841== 
==9841== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9842== Checked 4,865,176 bytes
==9842== 
==9842== LEAK SUMMARY:
==9842==    definitely lost: 2,213 bytes in 13 blocks
==9842==    indirectly lost: 6,796 bytes in 9 blocks
==9842==      possibly lost: 0 bytes in 0 blocks
==9842==    still reachable: 3,108,392 bytes in 69,020 blocks
==9842==         suppressed: 0 bytes in 0 blocks
==9842== Rerun with --leak-check=full to see details of leaked memory
==9842== 
==9842== Use --track-origins=yes to see where uninitialised values come from
==9842== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9842== 
==9842== 1 errors in context 1 of 2:
==9842== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9842==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9842==    by 0x488CD0: stringsubst (subst.c:301)
==9842==    by 0x48801B: prefork (subst.c:77)
==9842==    by 0x42B318: execcmd (exec.c:2619)
==9842==    by 0x428CA0: execpline2 (exec.c:1697)
==9842==    by 0x427FD2: execpline (exec.c:1484)
==9842==    by 0x427756: execlist (exec.c:1267)
==9842==    by 0x42717C: execode (exec.c:1073)
==9842==    by 0x431299: runshfunc (exec.c:5040)
==9842==    by 0x430E76: doshfunc (exec.c:4920)
==9842==    by 0x4302FB: execshfunc (exec.c:4557)
==9842==    by 0x42D8C1: execcmd (exec.c:3373)
==9842== 
==9842== 
==9842== 2 errors in context 2 of 2:
==9842== Conditional jump or move depends on uninitialised value(s)
==9842==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9842==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9842==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9842==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9842==    by 0x42D8E9: execcmd (exec.c:3378)
==9842==    by 0x428CA0: execpline2 (exec.c:1697)
==9842==    by 0x427FD2: execpline (exec.c:1484)
==9842==    by 0x42779A: execlist (exec.c:1275)
==9842==    by 0x42717C: execode (exec.c:1073)
==9842==    by 0x431299: runshfunc (exec.c:5040)
==9842==    by 0x430E76: doshfunc (exec.c:4920)
==9842==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9842== 
==9842== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9844== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9844-by-pythonnut-on-???
==9844== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9844-by-pythonnut-on-???
==9844== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9844-by-pythonnut-on-???
==9844== 
==9844== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9844== don't want to do, unless you know exactly what you're doing,
==9844== or are doing some strange experiment):
==9844==   /usr/lib/valgrind/../../bin/vgdb --pid=9844 ...command...
==9844== 
==9844== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9844==   /path/to/gdb ./zsh
==9844== and then give GDB the following command
==9844==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9844
==9844== --pid is optional if only one valgrind process is running
==9844== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9828-- Caught __NR_exit; running __libc_freeres()
--9828-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9828== 
==9828== HEAP SUMMARY:
==9828==     in use at exit: 3,116,455 bytes in 69,019 blocks
==9828==   total heap usage: 1,585,281 allocs, 1,516,262 frees, 127,939,231 bytes allocated
==9828== 
==9828== Searching for pointers to 69,019 not-freed blocks
--9828--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9828--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9828--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9828--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9828--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9828--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9828--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9828--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9828--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9828--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9828--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9828--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9828--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9828--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9828--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9828--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9828--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9828--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9828--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9828--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9828--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9828--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9828--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9828--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9828--   Scanning root segment: 0x701a000..0x701afff (4096)
--9828--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9828--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9828--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9828--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9828--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9828--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9828--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9828--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9828--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9828--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9828== Checked 4,772,048 bytes
==9828== 
==9828== LEAK SUMMARY:
==9828==    definitely lost: 2,189 bytes in 12 blocks
==9828==    indirectly lost: 6,756 bytes in 7 blocks
==9828==      possibly lost: 0 bytes in 0 blocks
==9828==    still reachable: 3,107,510 bytes in 69,000 blocks
==9828==         suppressed: 0 bytes in 0 blocks
==9828== Rerun with --leak-check=full to see details of leaked memory
==9828== 
==9828== Use --track-origins=yes to see where uninitialised values come from
==9828== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9828== 
==9828== 1 errors in context 1 of 2:
==9828== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9828==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9828==    by 0x488CD0: stringsubst (subst.c:301)
==9828==    by 0x48801B: prefork (subst.c:77)
==9828==    by 0x42B318: execcmd (exec.c:2619)
==9828==    by 0x428CA0: execpline2 (exec.c:1697)
==9828==    by 0x427FD2: execpline (exec.c:1484)
==9828==    by 0x427756: execlist (exec.c:1267)
==9828==    by 0x42717C: execode (exec.c:1073)
==9828==    by 0x431299: runshfunc (exec.c:5040)
==9828==    by 0x430E76: doshfunc (exec.c:4920)
==9828==    by 0x4302FB: execshfunc (exec.c:4557)
==9828==    by 0x42D8C1: execcmd (exec.c:3373)
==9828== 
==9828== 
==9828== 2 errors in context 2 of 2:
==9828== Conditional jump or move depends on uninitialised value(s)
==9828==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9828==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9828==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9828==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9828==    by 0x42D8E9: execcmd (exec.c:3378)
==9828==    by 0x428CA0: execpline2 (exec.c:1697)
==9828==    by 0x427FD2: execpline (exec.c:1484)
==9828==    by 0x42779A: execlist (exec.c:1275)
==9828==    by 0x42717C: execode (exec.c:1073)
==9828==    by 0x431299: runshfunc (exec.c:5040)
==9828==    by 0x430E76: doshfunc (exec.c:4920)
==9828==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9828== 
==9828== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9846== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9846-by-pythonnut-on-???
==9846== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9846-by-pythonnut-on-???
==9846== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9846-by-pythonnut-on-???
==9846== 
==9846== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9846== don't want to do, unless you know exactly what you're doing,
==9846== or are doing some strange experiment):
==9846==   /usr/lib/valgrind/../../bin/vgdb --pid=9846 ...command...
==9846== 
==9846== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9846==   /path/to/gdb ./zsh
==9846== and then give GDB the following command
==9846==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9846
==9846== --pid is optional if only one valgrind process is running
==9846== 
==9845== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9845-by-pythonnut-on-???
==9845== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9845-by-pythonnut-on-???
==9845== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9845-by-pythonnut-on-???
==9845== 
==9845== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9845== don't want to do, unless you know exactly what you're doing,
==9845== or are doing some strange experiment):
==9845==   /usr/lib/valgrind/../../bin/vgdb --pid=9845 ...command...
==9845== 
==9845== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9845==   /path/to/gdb ./zsh
==9845== and then give GDB the following command
==9845==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9845
==9845== --pid is optional if only one valgrind process is running
==9845== 
--9846-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF305C,  len 4
client request: code 4d430005,  addr 0xFFEFF2FBC,  len 4
--9846-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9846== 
==9846== HEAP SUMMARY:
==9846==     in use at exit: 3,116,345 bytes in 69,020 blocks
==9846==   total heap usage: 1,585,226 allocs, 1,516,206 frees, 127,888,600 bytes allocated
==9846== 
==9846== Searching for pointers to 69,020 not-freed blocks
--9846--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9846--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9846--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9846--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9846--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9846--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9846--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9846--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9846--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9846--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9846--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9846--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9846--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9846--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9846--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9846--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9846--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9846--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9846--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9846--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9846--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9846--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9846--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9846--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9846--   Scanning root segment: 0x701a000..0x701afff (4096)
--9846--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9846--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9846--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9846--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9846--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9846--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9846--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9846--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9846--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9846--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9846== Checked 4,773,128 bytes
==9846== 
==9846== LEAK SUMMARY:
==9846==    definitely lost: 2,189 bytes in 12 blocks
==9846==    indirectly lost: 6,756 bytes in 7 blocks
==9846==      possibly lost: 0 bytes in 0 blocks
==9846==    still reachable: 3,107,400 bytes in 69,001 blocks
==9846==         suppressed: 0 bytes in 0 blocks
==9846== Rerun with --leak-check=full to see details of leaked memory
==9846== 
==9846== Use --track-origins=yes to see where uninitialised values come from
==9846== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9846== 
==9846== 1 errors in context 1 of 2:
==9846== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9846==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9846==    by 0x488CD0: stringsubst (subst.c:301)
==9846==    by 0x48801B: prefork (subst.c:77)
==9846==    by 0x42B318: execcmd (exec.c:2619)
==9846==    by 0x428CA0: execpline2 (exec.c:1697)
==9846==    by 0x427FD2: execpline (exec.c:1484)
==9846==    by 0x427756: execlist (exec.c:1267)
==9846==    by 0x42717C: execode (exec.c:1073)
==9846==    by 0x431299: runshfunc (exec.c:5040)
==9846==    by 0x430E76: doshfunc (exec.c:4920)
==9846==    by 0x4302FB: execshfunc (exec.c:4557)
==9846==    by 0x42D8C1: execcmd (exec.c:3373)
==9846== 
==9846== 
==9846== 2 errors in context 2 of 2:
==9846== Conditional jump or move depends on uninitialised value(s)
==9846==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9846==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9846==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9846==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9846==    by 0x42D8E9: execcmd (exec.c:3378)
==9846==    by 0x428CA0: execpline2 (exec.c:1697)
==9846==    by 0x427FD2: execpline (exec.c:1484)
==9846==    by 0x42779A: execlist (exec.c:1275)
==9846==    by 0x42717C: execode (exec.c:1073)
==9846==    by 0x431299: runshfunc (exec.c:5040)
==9846==    by 0x430E76: doshfunc (exec.c:4920)
==9846==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9846== 
==9846== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9845-- Caught __NR_exit; running __libc_freeres()
--9845-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9845== 
==9845== HEAP SUMMARY:
==9845==     in use at exit: 3,116,281 bytes in 69,017 blocks
==9845==   total heap usage: 1,585,231 allocs, 1,516,214 frees, 127,889,456 bytes allocated
==9845== 
==9845== Searching for pointers to 69,017 not-freed blocks
--9845--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9845--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9845--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9845--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9845--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9845--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9845--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9845--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9845--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9845--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9845--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9845--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9845--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9845--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9845--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9845--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9845--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9845--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9845--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9845--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9845--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9845--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9845--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9845--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9845--   Scanning root segment: 0x701a000..0x701afff (4096)
--9845--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9845--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9845--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9845--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9845--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9845--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9845--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9845--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9845--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9845--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9845== Checked 4,772,440 bytes
==9845== 
==9845== LEAK SUMMARY:
==9845==    definitely lost: 2,189 bytes in 12 blocks
==9845==    indirectly lost: 6,756 bytes in 7 blocks
==9845==      possibly lost: 0 bytes in 0 blocks
==9845==    still reachable: 3,107,336 bytes in 68,998 blocks
==9845==         suppressed: 0 bytes in 0 blocks
==9845== Rerun with --leak-check=full to see details of leaked memory
==9845== 
==9845== Use --track-origins=yes to see where uninitialised values come from
==9845== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9845== 
==9845== 1 errors in context 1 of 2:
==9845== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9845==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9845==    by 0x488CD0: stringsubst (subst.c:301)
==9845==    by 0x48801B: prefork (subst.c:77)
==9845==    by 0x42B318: execcmd (exec.c:2619)
==9845==    by 0x428CA0: execpline2 (exec.c:1697)
==9845==    by 0x427FD2: execpline (exec.c:1484)
==9845==    by 0x427756: execlist (exec.c:1267)
==9845==    by 0x42717C: execode (exec.c:1073)
==9845==    by 0x431299: runshfunc (exec.c:5040)
==9845==    by 0x430E76: doshfunc (exec.c:4920)
==9845==    by 0x4302FB: execshfunc (exec.c:4557)
==9845==    by 0x42D8C1: execcmd (exec.c:3373)
==9845== 
==9845== 
==9845== 2 errors in context 2 of 2:
==9845== Conditional jump or move depends on uninitialised value(s)
==9845==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9845==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9845==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9845==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9845==    by 0x42D8E9: execcmd (exec.c:3378)
==9845==    by 0x428CA0: execpline2 (exec.c:1697)
==9845==    by 0x427FD2: execpline (exec.c:1484)
==9845==    by 0x42779A: execlist (exec.c:1275)
==9845==    by 0x42717C: execode (exec.c:1073)
==9845==    by 0x431299: runshfunc (exec.c:5040)
==9845==    by 0x430E76: doshfunc (exec.c:4920)
==9845==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9845== 
==9845== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9851== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9851-by-pythonnut-on-???
==9851== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9851-by-pythonnut-on-???
==9851== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9851-by-pythonnut-on-???
==9851== 
==9851== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9851== don't want to do, unless you know exactly what you're doing,
==9851== or are doing some strange experiment):
==9851==   /usr/lib/valgrind/../../bin/vgdb --pid=9851 ...command...
==9851== 
==9851== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9851==   /path/to/gdb ./zsh
==9851== and then give GDB the following command
==9851==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9851
==9851== --pid is optional if only one valgrind process is running
==9851== 
==9852== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9852-by-pythonnut-on-???
==9852== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9852-by-pythonnut-on-???
==9852== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9852-by-pythonnut-on-???
==9852== 
==9852== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9852== don't want to do, unless you know exactly what you're doing,
==9852== or are doing some strange experiment):
==9852==   /usr/lib/valgrind/../../bin/vgdb --pid=9852 ...command...
==9852== 
==9852== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9852==   /path/to/gdb ./zsh
==9852== and then give GDB the following command
==9852==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9852
==9852== --pid is optional if only one valgrind process is running
==9852== 
--9852-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1BFC,  len 4
client request: code 4d430005,  addr 0xFFEFF1B5C,  len 4
--9852-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9852== 
==9852== HEAP SUMMARY:
==9852==     in use at exit: 3,116,597 bytes in 69,022 blocks
==9852==   total heap usage: 1,585,260 allocs, 1,516,238 frees, 127,901,931 bytes allocated
==9852== 
==9852== Searching for pointers to 69,022 not-freed blocks
--9852--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9852--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9852--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9852--   Scanning root segment: 0x4037000..0x403afff (16384)
--9852--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9852--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9852--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9852--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9852--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9852--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9852--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9852--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9852--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9852--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9852--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9852--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9852--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9852--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9852--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9852--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9852--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9852--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9852--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9852--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9852--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9852--   Scanning root segment: 0x701a000..0x701afff (4096)
--9852--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9852--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9852--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9852--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9852--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9852--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9852--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9852--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9852--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9852--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9852== Checked 4,791,064 bytes
==9852== 
==9852== LEAK SUMMARY:
==9852==    definitely lost: 2,189 bytes in 12 blocks
==9852==    indirectly lost: 6,756 bytes in 7 blocks
==9852==      possibly lost: 0 bytes in 0 blocks
==9852==    still reachable: 3,107,652 bytes in 69,003 blocks
==9852==         suppressed: 0 bytes in 0 blocks
==9852== Rerun with --leak-check=full to see details of leaked memory
==9852== 
==9852== Use --track-origins=yes to see where uninitialised values come from
==9852== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9852== 
==9852== 1 errors in context 1 of 2:
==9852== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9852==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9852==    by 0x488CD0: stringsubst (subst.c:301)
==9852==    by 0x48801B: prefork (subst.c:77)
==9852==    by 0x42B318: execcmd (exec.c:2619)
==9852==    by 0x428CA0: execpline2 (exec.c:1697)
==9852==    by 0x427FD2: execpline (exec.c:1484)
==9852==    by 0x427756: execlist (exec.c:1267)
==9852==    by 0x42717C: execode (exec.c:1073)
==9852==    by 0x431299: runshfunc (exec.c:5040)
==9852==    by 0x430E76: doshfunc (exec.c:4920)
==9852==    by 0x4302FB: execshfunc (exec.c:4557)
==9852==    by 0x42D8C1: execcmd (exec.c:3373)
==9852== 
==9852== 
==9852== 2 errors in context 2 of 2:
==9852== Conditional jump or move depends on uninitialised value(s)
==9852==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9852==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9852==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9852==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9852==    by 0x42D8E9: execcmd (exec.c:3378)
==9852==    by 0x428CA0: execpline2 (exec.c:1697)
==9852==    by 0x427FD2: execpline (exec.c:1484)
==9852==    by 0x42779A: execlist (exec.c:1275)
==9852==    by 0x42717C: execode (exec.c:1073)
==9852==    by 0x431299: runshfunc (exec.c:5040)
==9852==    by 0x430E76: doshfunc (exec.c:4920)
==9852==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9852== 
==9852== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9851-- Caught __NR_exit; running __libc_freeres()
--9851-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9851== 
==9851== HEAP SUMMARY:
==9851==     in use at exit: 3,116,596 bytes in 69,023 blocks
==9851==   total heap usage: 1,585,256 allocs, 1,516,233 frees, 127,898,379 bytes allocated
==9851== 
==9851== Searching for pointers to 69,023 not-freed blocks
--9851--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9851--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9851--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9851--   Scanning root segment: 0x4037000..0x403afff (16384)
--9851--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9851--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9851--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9851--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9851--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9851--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9851--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9851--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9851--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9851--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9851--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9851--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9851--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9851--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9851--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9851--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9851--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9851--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9851--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9851--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9851--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9851--   Scanning root segment: 0x701a000..0x701afff (4096)
--9851--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9851--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9851--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9851--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9851--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9851--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9851--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9851--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9851--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9851--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9851== Checked 4,790,744 bytes
==9851== 
==9851== LEAK SUMMARY:
==9851==    definitely lost: 2,189 bytes in 12 blocks
==9851==    indirectly lost: 6,756 bytes in 7 blocks
==9851==      possibly lost: 0 bytes in 0 blocks
==9851==    still reachable: 3,107,651 bytes in 69,004 blocks
==9851==         suppressed: 0 bytes in 0 blocks
==9851== Rerun with --leak-check=full to see details of leaked memory
==9851== 
==9851== Use --track-origins=yes to see where uninitialised values come from
==9851== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9851== 
==9851== 1 errors in context 1 of 2:
==9851== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9851==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9851==    by 0x488CD0: stringsubst (subst.c:301)
==9851==    by 0x48801B: prefork (subst.c:77)
==9851==    by 0x42B318: execcmd (exec.c:2619)
==9851==    by 0x428CA0: execpline2 (exec.c:1697)
==9851==    by 0x427FD2: execpline (exec.c:1484)
==9851==    by 0x427756: execlist (exec.c:1267)
==9851==    by 0x42717C: execode (exec.c:1073)
==9851==    by 0x431299: runshfunc (exec.c:5040)
==9851==    by 0x430E76: doshfunc (exec.c:4920)
==9851==    by 0x4302FB: execshfunc (exec.c:4557)
==9851==    by 0x42D8C1: execcmd (exec.c:3373)
==9851== 
==9851== 
==9851== 2 errors in context 2 of 2:
==9851== Conditional jump or move depends on uninitialised value(s)
==9851==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9851==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9851==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9851==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9851==    by 0x42D8E9: execcmd (exec.c:3378)
==9851==    by 0x428CA0: execpline2 (exec.c:1697)
==9851==    by 0x427FD2: execpline (exec.c:1484)
==9851==    by 0x42779A: execlist (exec.c:1275)
==9851==    by 0x42717C: execode (exec.c:1073)
==9851==    by 0x431299: runshfunc (exec.c:5040)
==9851==    by 0x430E76: doshfunc (exec.c:4920)
==9851==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9851== 
==9851== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9856== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9856-by-pythonnut-on-???
==9856== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9856-by-pythonnut-on-???
==9856== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9856-by-pythonnut-on-???
==9856== 
==9856== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9856== don't want to do, unless you know exactly what you're doing,
==9856== or are doing some strange experiment):
==9856==   /usr/lib/valgrind/../../bin/vgdb --pid=9856 ...command...
==9856== 
==9856== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9856==   /path/to/gdb ./zsh
==9856== and then give GDB the following command
==9856==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9856
==9856== --pid is optional if only one valgrind process is running
==9856== 
client request: code 4d430005,  addr 0xFFEFF214C,  len 4
==9855== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9855-by-pythonnut-on-???
==9855== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9855-by-pythonnut-on-???
==9855== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9855-by-pythonnut-on-???
==9855== 
==9855== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9855== don't want to do, unless you know exactly what you're doing,
==9855== or are doing some strange experiment):
==9855==   /usr/lib/valgrind/../../bin/vgdb --pid=9855 ...command...
==9855== 
==9855== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9855==   /path/to/gdb ./zsh
==9855== and then give GDB the following command
==9855==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9855
==9855== --pid is optional if only one valgrind process is running
==9855== 
--9855-- Caught __NR_exit; running __libc_freeres()
--9855-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9855== 
==9855== HEAP SUMMARY:
==9855==     in use at exit: 3,116,888 bytes in 69,028 blocks
==9855==   total heap usage: 1,585,267 allocs, 1,516,239 frees, 127,903,519 bytes allocated
==9855== 
==9855== Searching for pointers to 69,028 not-freed blocks
--9855--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9855--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9855--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9855--   Scanning root segment: 0x4037000..0x403afff (16384)
--9855--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9855--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9855--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9855--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9855--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9855--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9855--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9855--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9855--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9855--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9855--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9855--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9855--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9855--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9855--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9855--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9855--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9855--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9855--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9855--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9855--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9855--   Scanning root segment: 0x701a000..0x701afff (4096)
--9855--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9855--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9855--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9855--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9855--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9855--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9855--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9855--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9855--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9855--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9855== Checked 4,790,760 bytes
==9855== 
==9855== LEAK SUMMARY:
==9855==    definitely lost: 2,189 bytes in 12 blocks
==9855==    indirectly lost: 6,756 bytes in 7 blocks
==9855==      possibly lost: 0 bytes in 0 blocks
==9855==    still reachable: 3,107,943 bytes in 69,009 blocks
==9855==         suppressed: 0 bytes in 0 blocks
==9855== Rerun with --leak-check=full to see details of leaked memory
==9855== 
==9855== Use --track-origins=yes to see where uninitialised values come from
==9855== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9855== 
==9855== 1 errors in context 1 of 2:
==9855== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9855==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9855==    by 0x488CD0: stringsubst (subst.c:301)
==9855==    by 0x48801B: prefork (subst.c:77)
==9855==    by 0x42B318: execcmd (exec.c:2619)
==9855==    by 0x428CA0: execpline2 (exec.c:1697)
==9855==    by 0x427FD2: execpline (exec.c:1484)
==9855==    by 0x427756: execlist (exec.c:1267)
==9855==    by 0x42717C: execode (exec.c:1073)
==9855==    by 0x431299: runshfunc (exec.c:5040)
==9855==    by 0x430E76: doshfunc (exec.c:4920)
==9855==    by 0x4302FB: execshfunc (exec.c:4557)
==9855==    by 0x42D8C1: execcmd (exec.c:3373)
==9855== 
==9855== 
==9855== 2 errors in context 2 of 2:
==9855== Conditional jump or move depends on uninitialised value(s)
==9855==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9855==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9855==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9855==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9855==    by 0x42D8E9: execcmd (exec.c:3378)
==9855==    by 0x428CA0: execpline2 (exec.c:1697)
==9855==    by 0x427FD2: execpline (exec.c:1484)
==9855==    by 0x42779A: execlist (exec.c:1275)
==9855==    by 0x42717C: execode (exec.c:1073)
==9855==    by 0x431299: runshfunc (exec.c:5040)
==9855==    by 0x430E76: doshfunc (exec.c:4920)
==9855==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9855== 
==9855== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1C9C,  len 4
--9857-- Caught __NR_exit; running __libc_freeres()
==9857== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9857-by-pythonnut-on-???
==9857== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9857-by-pythonnut-on-???
==9857== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9857-by-pythonnut-on-???
==9857== 
==9857== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9857== don't want to do, unless you know exactly what you're doing,
==9857== or are doing some strange experiment):
==9857==   /usr/lib/valgrind/../../bin/vgdb --pid=9857 ...command...
==9857== 
==9857== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9857==   /path/to/gdb ./zsh
==9857== and then give GDB the following command
==9857==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9857
==9857== --pid is optional if only one valgrind process is running
==9857== 
--9857-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9857== 
==9857== HEAP SUMMARY:
==9857==     in use at exit: 3,116,917 bytes in 69,029 blocks
==9857==   total heap usage: 1,585,272 allocs, 1,516,243 frees, 127,905,660 bytes allocated
==9857== 
==9857== Searching for pointers to 69,029 not-freed blocks
--9857--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9857--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9857--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9857--   Scanning root segment: 0x4037000..0x403afff (16384)
--9857--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9857--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9857--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9857--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9857--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9857--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9857--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9857--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9857--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9857--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9857--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9857--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9857--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9857--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9857--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9857--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9857--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9857--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9857--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9857--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9857--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9857--   Scanning root segment: 0x701a000..0x701afff (4096)
--9857--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9857--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9857--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9857--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9857--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9857--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9857--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9857--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9857--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9857--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9857== Checked 4,791,056 bytes
==9857== 
==9857== LEAK SUMMARY:
==9857==    definitely lost: 2,189 bytes in 12 blocks
==9857==    indirectly lost: 6,756 bytes in 7 blocks
==9857==      possibly lost: 0 bytes in 0 blocks
==9857==    still reachable: 3,107,972 bytes in 69,010 blocks
==9857==         suppressed: 0 bytes in 0 blocks
==9857== Rerun with --leak-check=full to see details of leaked memory
==9857== 
==9857== Use --track-origins=yes to see where uninitialised values come from
==9857== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9857== 
==9857== 1 errors in context 1 of 2:
==9857== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9857==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9857==    by 0x488CD0: stringsubst (subst.c:301)
==9857==    by 0x48801B: prefork (subst.c:77)
==9857==    by 0x42B318: execcmd (exec.c:2619)
==9857==    by 0x428CA0: execpline2 (exec.c:1697)
==9857==    by 0x427FD2: execpline (exec.c:1484)
==9857==    by 0x427756: execlist (exec.c:1267)
==9857==    by 0x42717C: execode (exec.c:1073)
==9857==    by 0x431299: runshfunc (exec.c:5040)
==9857==    by 0x430E76: doshfunc (exec.c:4920)
==9857==    by 0x4302FB: execshfunc (exec.c:4557)
==9857==    by 0x42D8C1: execcmd (exec.c:3373)
==9857== 
==9857== 
==9857== 2 errors in context 2 of 2:
==9857== Conditional jump or move depends on uninitialised value(s)
==9857==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9857==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9857==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9857==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9857==    by 0x42D8E9: execcmd (exec.c:3378)
==9857==    by 0x428CA0: execpline2 (exec.c:1697)
==9857==    by 0x427FD2: execpline (exec.c:1484)
==9857==    by 0x42779A: execlist (exec.c:1275)
==9857==    by 0x42717C: execode (exec.c:1073)
==9857==    by 0x431299: runshfunc (exec.c:5040)
==9857==    by 0x430E76: doshfunc (exec.c:4920)
==9857==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9857== 
==9857== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9859== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9859-by-pythonnut-on-???
==9859== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9859-by-pythonnut-on-???
==9859== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9859-by-pythonnut-on-???
==9859== 
==9859== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9859== don't want to do, unless you know exactly what you're doing,
==9859== or are doing some strange experiment):
==9859==   /usr/lib/valgrind/../../bin/vgdb --pid=9859 ...command...
==9859== 
==9859== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9859==   /path/to/gdb ./zsh
==9859== and then give GDB the following command
==9859==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9859
==9859== --pid is optional if only one valgrind process is running
==9859== 
client request: code 4d430005,  addr 0xFFEFF261C,  len 4
client request: code 4d430005,  addr 0xFFEFF1F9C,  len 4
--9827-- Caught __NR_exit; running __libc_freeres()
--9827-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9827== 
==9827== HEAP SUMMARY:
==9827==     in use at exit: 3,115,045 bytes in 68,981 blocks
==9827==   total heap usage: 1,585,281 allocs, 1,516,300 frees, 127,909,600 bytes allocated
==9827== 
==9827== Searching for pointers to 68,981 not-freed blocks
--9827--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9827--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9827--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9827--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9827--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9827--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9827--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9827--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9827--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9827--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9827--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9827--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9827--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9827--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9827--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9827--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9827--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9827--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9827--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9827--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9827--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9827--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9827--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9827--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9827--   Scanning root segment: 0x701a000..0x701afff (4096)
--9827--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9827--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9827--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9827--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9827--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9827--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9827--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9827--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9827--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9827--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9827== Checked 4,768,904 bytes
==9827== 
==9827== LEAK SUMMARY:
==9827==    definitely lost: 2,189 bytes in 12 blocks
==9827==    indirectly lost: 6,756 bytes in 7 blocks
==9827==      possibly lost: 0 bytes in 0 blocks
==9827==    still reachable: 3,106,100 bytes in 68,962 blocks
==9827==         suppressed: 0 bytes in 0 blocks
==9827== Rerun with --leak-check=full to see details of leaked memory
==9827== 
==9827== Use --track-origins=yes to see where uninitialised values come from
==9827== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9827== 
==9827== 1 errors in context 1 of 2:
==9827== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9827==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9827==    by 0x488CD0: stringsubst (subst.c:301)
==9827==    by 0x48801B: prefork (subst.c:77)
==9827==    by 0x42B318: execcmd (exec.c:2619)
==9827==    by 0x428CA0: execpline2 (exec.c:1697)
==9827==    by 0x427FD2: execpline (exec.c:1484)
==9827==    by 0x427756: execlist (exec.c:1267)
==9827==    by 0x42717C: execode (exec.c:1073)
==9827==    by 0x431299: runshfunc (exec.c:5040)
==9827==    by 0x430E76: doshfunc (exec.c:4920)
==9827==    by 0x4302FB: execshfunc (exec.c:4557)
==9827==    by 0x42D8C1: execcmd (exec.c:3373)
==9827== 
==9827== 
==9827== 2 errors in context 2 of 2:
==9827== Conditional jump or move depends on uninitialised value(s)
==9827==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9827==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9827==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9827==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9827==    by 0x42D8E9: execcmd (exec.c:3378)
==9827==    by 0x428CA0: execpline2 (exec.c:1697)
==9827==    by 0x427FD2: execpline (exec.c:1484)
==9827==    by 0x42779A: execlist (exec.c:1275)
==9827==    by 0x42717C: execode (exec.c:1073)
==9827==    by 0x431299: runshfunc (exec.c:5040)
==9827==    by 0x430E76: doshfunc (exec.c:4920)
==9827==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9827== 
==9827== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9861== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9861-by-pythonnut-on-???
==9861== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9861-by-pythonnut-on-???
==9861== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9861-by-pythonnut-on-???
==9861== 
==9861== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9861== don't want to do, unless you know exactly what you're doing,
==9861== or are doing some strange experiment):
==9861==   /usr/lib/valgrind/../../bin/vgdb --pid=9861 ...command...
==9861== 
==9861== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9861==   /path/to/gdb ./zsh
==9861== and then give GDB the following command
==9861==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9861
==9861== --pid is optional if only one valgrind process is running
==9861== 
==9862== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9862-by-pythonnut-on-???
==9862== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9862-by-pythonnut-on-???
==9862== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9862-by-pythonnut-on-???
==9862== 
==9862== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9862== don't want to do, unless you know exactly what you're doing,
==9862== or are doing some strange experiment):
==9862==   /usr/lib/valgrind/../../bin/vgdb --pid=9862 ...command...
==9862== 
==9862== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9862==   /path/to/gdb ./zsh
==9862== and then give GDB the following command
==9862==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9862
==9862== --pid is optional if only one valgrind process is running
==9862== 
client request: code 4d430005,  addr 0xFFEFF07BC,  len 4
==9863== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9863-by-pythonnut-on-???
==9863== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9863-by-pythonnut-on-???
==9863== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9863-by-pythonnut-on-???
==9863== 
==9863== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9863== don't want to do, unless you know exactly what you're doing,
==9863== or are doing some strange experiment):
==9863==   /usr/lib/valgrind/../../bin/vgdb --pid=9863 ...command...
==9863== 
==9863== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9863==   /path/to/gdb ./zsh
==9863== and then give GDB the following command
==9863==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9863
==9863== --pid is optional if only one valgrind process is running
==9863== 
--9863-- Caught __NR_exit; running __libc_freeres()
--9863-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9863== 
==9863== HEAP SUMMARY:
==9863==     in use at exit: 3,116,894 bytes in 69,028 blocks
==9863==   total heap usage: 1,585,241 allocs, 1,516,213 frees, 127,888,261 bytes allocated
==9863== 
==9863== Searching for pointers to 69,028 not-freed blocks
--9863--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9863--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9863--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9863--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9863--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9863--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9863--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9863--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9863--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9863--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9863--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9863--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9863--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9863--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9863--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9863--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9863--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9863--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9863--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9863--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9863--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9863--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9863--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9863--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9863--   Scanning root segment: 0x701a000..0x701afff (4096)
--9863--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9863--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9863--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9863--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9863--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9863--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9863--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9863--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9863--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9863--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9863== Checked 4,774,744 bytes
==9863== 
==9863== LEAK SUMMARY:
==9863==    definitely lost: 2,189 bytes in 12 blocks
==9863==    indirectly lost: 6,756 bytes in 7 blocks
==9863==      possibly lost: 0 bytes in 0 blocks
==9863==    still reachable: 3,107,949 bytes in 69,009 blocks
==9863==         suppressed: 0 bytes in 0 blocks
==9863== Rerun with --leak-check=full to see details of leaked memory
==9863== 
==9863== Use --track-origins=yes to see where uninitialised values come from
==9863== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9863== 
==9863== 1 errors in context 1 of 2:
==9863== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9863==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9863==    by 0x488CD0: stringsubst (subst.c:301)
==9863==    by 0x48801B: prefork (subst.c:77)
==9863==    by 0x42B318: execcmd (exec.c:2619)
==9863==    by 0x428CA0: execpline2 (exec.c:1697)
==9863==    by 0x427FD2: execpline (exec.c:1484)
==9863==    by 0x427756: execlist (exec.c:1267)
==9863==    by 0x42717C: execode (exec.c:1073)
==9863==    by 0x431299: runshfunc (exec.c:5040)
==9863==    by 0x430E76: doshfunc (exec.c:4920)
==9863==    by 0x4302FB: execshfunc (exec.c:4557)
==9863==    by 0x42D8C1: execcmd (exec.c:3373)
==9863== 
==9863== 
==9863== 2 errors in context 2 of 2:
==9863== Conditional jump or move depends on uninitialised value(s)
==9863==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9863==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9863==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9863==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9863==    by 0x42D8E9: execcmd (exec.c:3378)
==9863==    by 0x428CA0: execpline2 (exec.c:1697)
==9863==    by 0x427FD2: execpline (exec.c:1484)
==9863==    by 0x42779A: execlist (exec.c:1275)
==9863==    by 0x42717C: execode (exec.c:1073)
==9863==    by 0x431299: runshfunc (exec.c:5040)
==9863==    by 0x430E76: doshfunc (exec.c:4920)
==9863==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9863== 
==9863== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9868-- Caught __NR_exit; running __libc_freeres()
==9868== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9868-by-pythonnut-on-???
==9868== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9868-by-pythonnut-on-???
==9868== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9868-by-pythonnut-on-???
==9868== 
==9868== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9868== don't want to do, unless you know exactly what you're doing,
==9868== or are doing some strange experiment):
==9868==   /usr/lib/valgrind/../../bin/vgdb --pid=9868 ...command...
==9868== 
==9868== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9868==   /path/to/gdb ./zsh
==9868== and then give GDB the following command
==9868==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9868
==9868== --pid is optional if only one valgrind process is running
==9868== 
==9869== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9869-by-pythonnut-on-???
==9869== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9869-by-pythonnut-on-???
==9869== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9869-by-pythonnut-on-???
==9869== 
==9869== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9869== don't want to do, unless you know exactly what you're doing,
==9869== or are doing some strange experiment):
==9869==   /usr/lib/valgrind/../../bin/vgdb --pid=9869 ...command...
==9869== 
==9869== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9869==   /path/to/gdb ./zsh
==9869== and then give GDB the following command
==9869==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9869
==9869== --pid is optional if only one valgrind process is running
==9869== 
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9868-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9868== 
==9868== HEAP SUMMARY:
==9868==     in use at exit: 3,153,785 bytes in 69,036 blocks
==9868==   total heap usage: 1,585,249 allocs, 1,516,213 frees, 127,928,208 bytes allocated
==9868== 
==9868== Searching for pointers to 69,036 not-freed blocks
--9868--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9868--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9868--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9868--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9868--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9868--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9868--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9868--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9868--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9868--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9868--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9868--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9868--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9868--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9868--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9868--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9868--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9868--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9868--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9868--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9868--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9868--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9868--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9868--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9868--   Scanning root segment: 0x701a000..0x701afff (4096)
--9868--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9868--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9868--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9868--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9868--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9868--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9868--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9868--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9868--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9868--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9868== Checked 4,886,552 bytes
==9868== 
==9868== LEAK SUMMARY:
==9868==    definitely lost: 2,189 bytes in 12 blocks
==9868==    indirectly lost: 6,756 bytes in 7 blocks
==9868==      possibly lost: 0 bytes in 0 blocks
==9868==    still reachable: 3,144,840 bytes in 69,017 blocks
==9868==         suppressed: 0 bytes in 0 blocks
==9868== Rerun with --leak-check=full to see details of leaked memory
==9868== 
==9868== Use --track-origins=yes to see where uninitialised values come from
==9868== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9868== 
==9868== 1 errors in context 1 of 2:
==9868== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9868==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9868==    by 0x488CD0: stringsubst (subst.c:301)
==9868==    by 0x48801B: prefork (subst.c:77)
==9868==    by 0x42B318: execcmd (exec.c:2619)
==9868==    by 0x428CA0: execpline2 (exec.c:1697)
==9868==    by 0x427FD2: execpline (exec.c:1484)
==9868==    by 0x427756: execlist (exec.c:1267)
==9868==    by 0x42717C: execode (exec.c:1073)
==9868==    by 0x431299: runshfunc (exec.c:5040)
==9868==    by 0x430E76: doshfunc (exec.c:4920)
==9868==    by 0x4302FB: execshfunc (exec.c:4557)
==9868==    by 0x42D8C1: execcmd (exec.c:3373)
==9868== 
==9868== 
==9868== 2 errors in context 2 of 2:
==9868== Conditional jump or move depends on uninitialised value(s)
==9868==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9868==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9868==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9868==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9868==    by 0x42D8E9: execcmd (exec.c:3378)
==9868==    by 0x428CA0: execpline2 (exec.c:1697)
==9868==    by 0x427FD2: execpline (exec.c:1484)
==9868==    by 0x42779A: execlist (exec.c:1275)
==9868==    by 0x42717C: execode (exec.c:1073)
==9868==    by 0x431299: runshfunc (exec.c:5040)
==9868==    by 0x430E76: doshfunc (exec.c:4920)
==9868==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9868== 
==9868== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9867== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9867-by-pythonnut-on-???
==9867== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9867-by-pythonnut-on-???
==9867== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9867-by-pythonnut-on-???
==9867== 
==9867== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9867== don't want to do, unless you know exactly what you're doing,
==9867== or are doing some strange experiment):
==9867==   /usr/lib/valgrind/../../bin/vgdb --pid=9867 ...command...
==9867== 
==9867== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9867==   /path/to/gdb ./zsh
==9867== and then give GDB the following command
==9867==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9867
==9867== --pid is optional if only one valgrind process is running
==9867== 
--9867-- Caught __NR_exit; running __libc_freeres()
--9867-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9867== 
==9867== HEAP SUMMARY:
==9867==     in use at exit: 3,153,721 bytes in 69,033 blocks
==9867==   total heap usage: 1,585,251 allocs, 1,516,218 frees, 127,928,752 bytes allocated
==9867== 
==9867== Searching for pointers to 69,033 not-freed blocks
--9867--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9867--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9867--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9867--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9867--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9867--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9867--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9867--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9867--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9867--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9867--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9867--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9867--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9867--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9867--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9867--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9867--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9867--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9867--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9867--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9867--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9867--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9867--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9867--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9867--   Scanning root segment: 0x701a000..0x701afff (4096)
--9867--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9867--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9867--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9867--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9867--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9867--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9867--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9867--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9867--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9867--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9867== Checked 4,885,880 bytes
==9867== 
==9867== LEAK SUMMARY:
==9867==    definitely lost: 2,189 bytes in 12 blocks
==9867==    indirectly lost: 6,756 bytes in 7 blocks
==9867==      possibly lost: 0 bytes in 0 blocks
==9867==    still reachable: 3,144,776 bytes in 69,014 blocks
==9867==         suppressed: 0 bytes in 0 blocks
==9867== Rerun with --leak-check=full to see details of leaked memory
==9867== 
==9867== Use --track-origins=yes to see where uninitialised values come from
==9867== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9867== 
==9867== 1 errors in context 1 of 2:
==9867== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9867==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9867==    by 0x488CD0: stringsubst (subst.c:301)
==9867==    by 0x48801B: prefork (subst.c:77)
==9867==    by 0x42B318: execcmd (exec.c:2619)
==9867==    by 0x428CA0: execpline2 (exec.c:1697)
==9867==    by 0x427FD2: execpline (exec.c:1484)
==9867==    by 0x427756: execlist (exec.c:1267)
==9867==    by 0x42717C: execode (exec.c:1073)
==9867==    by 0x431299: runshfunc (exec.c:5040)
==9867==    by 0x430E76: doshfunc (exec.c:4920)
==9867==    by 0x4302FB: execshfunc (exec.c:4557)
==9867==    by 0x42D8C1: execcmd (exec.c:3373)
==9867== 
==9867== 
==9867== 2 errors in context 2 of 2:
==9867== Conditional jump or move depends on uninitialised value(s)
==9867==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9867==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9867==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9867==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9867==    by 0x42D8E9: execcmd (exec.c:3378)
==9867==    by 0x428CA0: execpline2 (exec.c:1697)
==9867==    by 0x427FD2: execpline (exec.c:1484)
==9867==    by 0x42779A: execlist (exec.c:1275)
==9867==    by 0x42717C: execode (exec.c:1073)
==9867==    by 0x431299: runshfunc (exec.c:5040)
==9867==    by 0x430E76: doshfunc (exec.c:4920)
==9867==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9867== 
==9867== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9870== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9870-by-pythonnut-on-???
==9870== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9870-by-pythonnut-on-???
==9870== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9870-by-pythonnut-on-???
==9870== 
==9870== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9870== don't want to do, unless you know exactly what you're doing,
==9870== or are doing some strange experiment):
==9870==   /usr/lib/valgrind/../../bin/vgdb --pid=9870 ...command...
==9870== 
==9870== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9870==   /path/to/gdb ./zsh
==9870== and then give GDB the following command
==9870==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9870
==9870== --pid is optional if only one valgrind process is running
==9870== 
==9871== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9871-by-pythonnut-on-???
==9871== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9871-by-pythonnut-on-???
==9871== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9871-by-pythonnut-on-???
==9871== 
==9871== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9871== don't want to do, unless you know exactly what you're doing,
==9871== or are doing some strange experiment):
==9871==   /usr/lib/valgrind/../../bin/vgdb --pid=9871 ...command...
==9871== 
==9871== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9871==   /path/to/gdb ./zsh
==9871== and then give GDB the following command
==9871==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9871
==9871== --pid is optional if only one valgrind process is running
==9871== 
--9871-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9871-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9871== 
==9871== HEAP SUMMARY:
==9871==     in use at exit: 3,190,435 bytes in 69,039 blocks
==9871==   total heap usage: 1,585,258 allocs, 1,516,219 frees, 127,967,043 bytes allocated
==9871== 
==9871== Searching for pointers to 69,039 not-freed blocks
--9871--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9871--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9871--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9871--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9871--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9871--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9871--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9871--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9871--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9871--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9871--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9871--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9871--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9871--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9871--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9871--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9871--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9871--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9871--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9871--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9871--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9871--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9871--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9871--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9871--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9871--   Scanning root segment: 0x701a000..0x701afff (4096)
--9871--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9871--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9871--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9871--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9871--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9871--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9871--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9871--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9871--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9871--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9871== Checked 4,960,064 bytes
==9871== 
==9871== LEAK SUMMARY:
==9871==    definitely lost: 2,189 bytes in 12 blocks
==9871==    indirectly lost: 6,756 bytes in 7 blocks
==9871==      possibly lost: 0 bytes in 0 blocks
==9871==    still reachable: 3,181,490 bytes in 69,020 blocks
==9871==         suppressed: 0 bytes in 0 blocks
==9871== Rerun with --leak-check=full to see details of leaked memory
==9871== 
==9871== Use --track-origins=yes to see where uninitialised values come from
==9871== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9871== 
==9871== 1 errors in context 1 of 2:
==9871== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9871==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9871==    by 0x488CD0: stringsubst (subst.c:301)
==9871==    by 0x48801B: prefork (subst.c:77)
==9871==    by 0x42B318: execcmd (exec.c:2619)
==9871==    by 0x428CA0: execpline2 (exec.c:1697)
==9871==    by 0x427FD2: execpline (exec.c:1484)
==9871==    by 0x427756: execlist (exec.c:1267)
==9871==    by 0x42717C: execode (exec.c:1073)
==9871==    by 0x431299: runshfunc (exec.c:5040)
==9871==    by 0x430E76: doshfunc (exec.c:4920)
==9871==    by 0x4302FB: execshfunc (exec.c:4557)
==9871==    by 0x42D8C1: execcmd (exec.c:3373)
==9871== 
==9871== 
==9871== 2 errors in context 2 of 2:
==9871== Conditional jump or move depends on uninitialised value(s)
==9871==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9871==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9871==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9871==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9871==    by 0x42D8E9: execcmd (exec.c:3378)
==9871==    by 0x428CA0: execpline2 (exec.c:1697)
==9871==    by 0x427FD2: execpline (exec.c:1484)
==9871==    by 0x42779A: execlist (exec.c:1275)
==9871==    by 0x42717C: execode (exec.c:1073)
==9871==    by 0x431299: runshfunc (exec.c:5040)
==9871==    by 0x430E76: doshfunc (exec.c:4920)
==9871==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9871== 
==9871== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9870-- Caught __NR_exit; running __libc_freeres()
--9870-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9870== 
==9870== HEAP SUMMARY:
==9870==     in use at exit: 3,153,795 bytes in 69,036 blocks
==9870==   total heap usage: 1,585,261 allocs, 1,516,225 frees, 127,967,619 bytes allocated
==9870== 
==9870== Searching for pointers to 69,036 not-freed blocks
--9870--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9870--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9870--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9870--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9870--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9870--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9870--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9870--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9870--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9870--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9870--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9870--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9870--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9870--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9870--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9870--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9870--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9870--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9870--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9870--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9870--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9870--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9870--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9870--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9870--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9870--   Scanning root segment: 0x701a000..0x701afff (4096)
--9870--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9870--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9870--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9870--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9870--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9870--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9870--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9870--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9870--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9870--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9870== Checked 4,922,808 bytes
==9870== 
==9870== LEAK SUMMARY:
==9870==    definitely lost: 2,189 bytes in 12 blocks
==9870==    indirectly lost: 6,756 bytes in 7 blocks
==9870==      possibly lost: 0 bytes in 0 blocks
==9870==    still reachable: 3,144,850 bytes in 69,017 blocks
==9870==         suppressed: 0 bytes in 0 blocks
==9870== Rerun with --leak-check=full to see details of leaked memory
==9870== 
==9870== Use --track-origins=yes to see where uninitialised values come from
==9870== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9870== 
==9870== 1 errors in context 1 of 2:
==9870== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9870==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9870==    by 0x488CD0: stringsubst (subst.c:301)
==9870==    by 0x48801B: prefork (subst.c:77)
==9870==    by 0x42B318: execcmd (exec.c:2619)
==9870==    by 0x428CA0: execpline2 (exec.c:1697)
==9870==    by 0x427FD2: execpline (exec.c:1484)
==9870==    by 0x427756: execlist (exec.c:1267)
==9870==    by 0x42717C: execode (exec.c:1073)
==9870==    by 0x431299: runshfunc (exec.c:5040)
==9870==    by 0x430E76: doshfunc (exec.c:4920)
==9870==    by 0x4302FB: execshfunc (exec.c:4557)
==9870==    by 0x42D8C1: execcmd (exec.c:3373)
==9870== 
==9870== 
==9870== 2 errors in context 2 of 2:
==9870== Conditional jump or move depends on uninitialised value(s)
==9870==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9870==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9870==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9870==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9870==    by 0x42D8E9: execcmd (exec.c:3378)
==9870==    by 0x428CA0: execpline2 (exec.c:1697)
==9870==    by 0x427FD2: execpline (exec.c:1484)
==9870==    by 0x42779A: execlist (exec.c:1275)
==9870==    by 0x42717C: execode (exec.c:1073)
==9870==    by 0x431299: runshfunc (exec.c:5040)
==9870==    by 0x430E76: doshfunc (exec.c:4920)
==9870==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9870== 
==9870== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9873== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9873-by-pythonnut-on-???
==9873== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9873-by-pythonnut-on-???
==9873== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9873-by-pythonnut-on-???
==9873== 
==9873== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9873== don't want to do, unless you know exactly what you're doing,
==9873== or are doing some strange experiment):
==9873==   /usr/lib/valgrind/../../bin/vgdb --pid=9873 ...command...
==9873== 
==9873== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9873==   /path/to/gdb ./zsh
==9873== and then give GDB the following command
==9873==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9873
==9873== --pid is optional if only one valgrind process is running
==9873== 
--9874-- Caught __NR_exit; running __libc_freeres()
==9874== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9874-by-pythonnut-on-???
==9874== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9874-by-pythonnut-on-???
==9874== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9874-by-pythonnut-on-???
==9874== 
==9874== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9874== don't want to do, unless you know exactly what you're doing,
==9874== or are doing some strange experiment):
==9874==   /usr/lib/valgrind/../../bin/vgdb --pid=9874 ...command...
==9874== 
==9874== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9874==   /path/to/gdb ./zsh
==9874== and then give GDB the following command
==9874==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9874
==9874== --pid is optional if only one valgrind process is running
==9874== 
--9874-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9874== 
==9874== HEAP SUMMARY:
==9874==     in use at exit: 3,154,651 bytes in 69,042 blocks
==9874==   total heap usage: 1,585,270 allocs, 1,516,228 frees, 127,935,331 bytes allocated
==9874== 
==9874== Searching for pointers to 69,042 not-freed blocks
--9874--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9874--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9874--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9874--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9874--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9874--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9874--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9874--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9874--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9874--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9874--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9874--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9874--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9874--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9874--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9874--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9874--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9874--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9874--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9874--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9874--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9874--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9874--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9874--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9874--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9874--   Scanning root segment: 0x701a000..0x701afff (4096)
--9874--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9874--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9874--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9874--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9874--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9874--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9874--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9874--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9874--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9874--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9874== Checked 4,903,504 bytes
==9874== 
==9874== LEAK SUMMARY:
==9874==    definitely lost: 2,189 bytes in 12 blocks
==9874==    indirectly lost: 6,756 bytes in 7 blocks
==9874==      possibly lost: 0 bytes in 0 blocks
==9874==    still reachable: 3,145,706 bytes in 69,023 blocks
==9874==         suppressed: 0 bytes in 0 blocks
==9874== Rerun with --leak-check=full to see details of leaked memory
==9874== 
==9874== Use --track-origins=yes to see where uninitialised values come from
==9874== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9874== 
==9874== 1 errors in context 1 of 2:
==9874== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9874==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9874==    by 0x488CD0: stringsubst (subst.c:301)
==9874==    by 0x48801B: prefork (subst.c:77)
==9874==    by 0x42B318: execcmd (exec.c:2619)
==9874==    by 0x428CA0: execpline2 (exec.c:1697)
==9874==    by 0x427FD2: execpline (exec.c:1484)
==9874==    by 0x427756: execlist (exec.c:1267)
==9874==    by 0x42717C: execode (exec.c:1073)
==9874==    by 0x431299: runshfunc (exec.c:5040)
==9874==    by 0x430E76: doshfunc (exec.c:4920)
==9874==    by 0x4302FB: execshfunc (exec.c:4557)
==9874==    by 0x42D8C1: execcmd (exec.c:3373)
==9874== 
==9874== 
==9874== 2 errors in context 2 of 2:
==9874== Conditional jump or move depends on uninitialised value(s)
==9874==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9874==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9874==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9874==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9874==    by 0x42D8E9: execcmd (exec.c:3378)
==9874==    by 0x428CA0: execpline2 (exec.c:1697)
==9874==    by 0x427FD2: execpline (exec.c:1484)
==9874==    by 0x42779A: execlist (exec.c:1275)
==9874==    by 0x42717C: execode (exec.c:1073)
==9874==    by 0x431299: runshfunc (exec.c:5040)
==9874==    by 0x430E76: doshfunc (exec.c:4920)
==9874==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9874== 
==9874== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9873-- Caught __NR_exit; running __libc_freeres()
--9873-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9873== 
==9873== HEAP SUMMARY:
==9873==     in use at exit: 3,154,416 bytes in 69,042 blocks
==9873==   total heap usage: 1,585,307 allocs, 1,516,265 frees, 127,944,840 bytes allocated
==9873== 
==9873== Searching for pointers to 69,042 not-freed blocks
--9873--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9873--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9873--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9873--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9873--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9873--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9873--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9873--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9873--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9873--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9873--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9873--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9873--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9873--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9873--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9873--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9873--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9873--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9873--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9873--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9873--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9873--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9873--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9873--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9873--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9873--   Scanning root segment: 0x701a000..0x701afff (4096)
--9873--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9873--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9873--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9873--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9873--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9873--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9873--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9873--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9873--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9873--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9873== Checked 4,902,704 bytes
==9873== 
==9873== LEAK SUMMARY:
==9873==    definitely lost: 2,189 bytes in 12 blocks
==9873==    indirectly lost: 6,756 bytes in 7 blocks
==9873==      possibly lost: 0 bytes in 0 blocks
==9873==    still reachable: 3,145,471 bytes in 69,023 blocks
==9873==         suppressed: 0 bytes in 0 blocks
==9873== Rerun with --leak-check=full to see details of leaked memory
==9873== 
==9873== Use --track-origins=yes to see where uninitialised values come from
==9873== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9873== 
==9873== 1 errors in context 1 of 2:
==9873== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9873==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9873==    by 0x488CD0: stringsubst (subst.c:301)
==9873==    by 0x48801B: prefork (subst.c:77)
==9873==    by 0x42B318: execcmd (exec.c:2619)
==9873==    by 0x428CA0: execpline2 (exec.c:1697)
==9873==    by 0x427FD2: execpline (exec.c:1484)
==9873==    by 0x427756: execlist (exec.c:1267)
==9873==    by 0x42717C: execode (exec.c:1073)
==9873==    by 0x431299: runshfunc (exec.c:5040)
==9873==    by 0x430E76: doshfunc (exec.c:4920)
==9873==    by 0x4302FB: execshfunc (exec.c:4557)
==9873==    by 0x42D8C1: execcmd (exec.c:3373)
==9873== 
==9873== 
==9873== 2 errors in context 2 of 2:
==9873== Conditional jump or move depends on uninitialised value(s)
==9873==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9873==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9873==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9873==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9873==    by 0x42D8E9: execcmd (exec.c:3378)
==9873==    by 0x428CA0: execpline2 (exec.c:1697)
==9873==    by 0x427FD2: execpline (exec.c:1484)
==9873==    by 0x42779A: execlist (exec.c:1275)
==9873==    by 0x42717C: execode (exec.c:1073)
==9873==    by 0x431299: runshfunc (exec.c:5040)
==9873==    by 0x430E76: doshfunc (exec.c:4920)
==9873==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9873== 
==9873== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9877-- Caught __NR_exit; running __libc_freeres()
==9877== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9877-by-pythonnut-on-???
==9877== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9877-by-pythonnut-on-???
==9877== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9877-by-pythonnut-on-???
==9877== 
==9877== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9877== don't want to do, unless you know exactly what you're doing,
==9877== or are doing some strange experiment):
==9877==   /usr/lib/valgrind/../../bin/vgdb --pid=9877 ...command...
==9877== 
==9877== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9877==   /path/to/gdb ./zsh
==9877== and then give GDB the following command
==9877==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9877
==9877== --pid is optional if only one valgrind process is running
==9877== 
client request: code 4d430005,  addr 0xFFEFF1A3C,  len 4
--9877-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9878-- Caught __NR_exit; running __libc_freeres()
==9877== 
==9877== HEAP SUMMARY:
==9877==     in use at exit: 3,117,465 bytes in 69,042 blocks
==9877==   total heap usage: 1,585,279 allocs, 1,516,237 frees, 127,938,751 bytes allocated
==9877== 
==9878== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9878-by-pythonnut-on-???
==9878== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9878-by-pythonnut-on-???
==9878== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9878-by-pythonnut-on-???
==9878== 
==9878== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9878== don't want to do, unless you know exactly what you're doing,
==9878== or are doing some strange experiment):
==9878==   /usr/lib/valgrind/../../bin/vgdb --pid=9878 ...command...
==9878== 
==9878== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9878==   /path/to/gdb ./zsh
==9878== and then give GDB the following command
==9878==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9878
==9878== --pid is optional if only one valgrind process is running
==9878== 
--9878-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9877== Searching for pointers to 69,042 not-freed blocks
==9878== 
--9877--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9877--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9877--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9877--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9877--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9877--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9877--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9877--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9877--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9877--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9877--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9877--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9877--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9877--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9877--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9877--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9877--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9877--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9877--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9877--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9877--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9877--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9877--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9877--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9877--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9877--   Scanning root segment: 0x701a000..0x701afff (4096)
--9877--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9877--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9877--   Scanning root segment: 0xae51000..0xae52fff (8192)
==9878== HEAP SUMMARY:
==9878==     in use at exit: 3,117,465 bytes in 69,042 blocks
==9878==   total heap usage: 1,585,284 allocs, 1,516,242 frees, 127,940,839 bytes allocated
==9878== 
--9877--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9877--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9877--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9877--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9877--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9877--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9877--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9878== Searching for pointers to 69,042 not-freed blocks
--9878--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9878--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9878--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9878--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9878--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9878--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9878--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9878--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9878--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9878--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9878--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9878--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9878--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9878--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9878--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9878--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9878--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9878--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9878--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9878--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9878--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9878--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9878--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9878--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9878--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9878--   Scanning root segment: 0x701a000..0x701afff (4096)
--9878--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9878--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9878--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9878--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9878--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9878--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9878--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9878--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9878--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9878--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9877== Checked 4,865,312 bytes
==9877== 
==9877== LEAK SUMMARY:
==9877==    definitely lost: 2,189 bytes in 12 blocks
==9877==    indirectly lost: 6,756 bytes in 7 blocks
==9877==      possibly lost: 0 bytes in 0 blocks
==9877==    still reachable: 3,108,520 bytes in 69,023 blocks
==9877==         suppressed: 0 bytes in 0 blocks
==9877== Rerun with --leak-check=full to see details of leaked memory
==9877== 
==9877== Use --track-origins=yes to see where uninitialised values come from
==9877== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9877== 
==9877== 1 errors in context 1 of 2:
==9877== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9877==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9877==    by 0x488CD0: stringsubst (subst.c:301)
==9877==    by 0x48801B: prefork (subst.c:77)
==9877==    by 0x42B318: execcmd (exec.c:2619)
==9877==    by 0x428CA0: execpline2 (exec.c:1697)
==9877==    by 0x427FD2: execpline (exec.c:1484)
==9877==    by 0x427756: execlist (exec.c:1267)
==9877==    by 0x42717C: execode (exec.c:1073)
==9877==    by 0x431299: runshfunc (exec.c:5040)
==9877==    by 0x430E76: doshfunc (exec.c:4920)
==9877==    by 0x4302FB: execshfunc (exec.c:4557)
==9877==    by 0x42D8C1: execcmd (exec.c:3373)
==9877== 
==9877== 
==9877== 2 errors in context 2 of 2:
==9877== Conditional jump or move depends on uninitialised value(s)
==9877==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9877==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9877==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9877==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9877==    by 0x42D8E9: execcmd (exec.c:3378)
==9877==    by 0x428CA0: execpline2 (exec.c:1697)
==9877==    by 0x427FD2: execpline (exec.c:1484)
==9877==    by 0x42779A: execlist (exec.c:1275)
==9877==    by 0x42717C: execode (exec.c:1073)
==9877==    by 0x431299: runshfunc (exec.c:5040)
==9877==    by 0x430E76: doshfunc (exec.c:4920)
==9877==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9877== 
==9877== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9878== Checked 4,865,440 bytes
==9878== 
==9878== LEAK SUMMARY:
==9878==    definitely lost: 2,213 bytes in 13 blocks
==9878==    indirectly lost: 6,796 bytes in 9 blocks
==9878==      possibly lost: 0 bytes in 0 blocks
==9878==    still reachable: 3,108,456 bytes in 69,020 blocks
==9878==         suppressed: 0 bytes in 0 blocks
==9878== Rerun with --leak-check=full to see details of leaked memory
==9878== 
==9878== Use --track-origins=yes to see where uninitialised values come from
==9878== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9878== 
==9878== 1 errors in context 1 of 2:
==9878== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9878==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9878==    by 0x488CD0: stringsubst (subst.c:301)
==9878==    by 0x48801B: prefork (subst.c:77)
==9878==    by 0x42B318: execcmd (exec.c:2619)
==9878==    by 0x428CA0: execpline2 (exec.c:1697)
==9878==    by 0x427FD2: execpline (exec.c:1484)
==9878==    by 0x427756: execlist (exec.c:1267)
==9878==    by 0x42717C: execode (exec.c:1073)
==9878==    by 0x431299: runshfunc (exec.c:5040)
==9878==    by 0x430E76: doshfunc (exec.c:4920)
==9878==    by 0x4302FB: execshfunc (exec.c:4557)
==9878==    by 0x42D8C1: execcmd (exec.c:3373)
==9878== 
==9878== 
==9878== 2 errors in context 2 of 2:
==9878== Conditional jump or move depends on uninitialised value(s)
==9878==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9878==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9878==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9878==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9878==    by 0x42D8E9: execcmd (exec.c:3378)
==9878==    by 0x428CA0: execpline2 (exec.c:1697)
==9878==    by 0x427FD2: execpline (exec.c:1484)
==9878==    by 0x42779A: execlist (exec.c:1275)
==9878==    by 0x42717C: execode (exec.c:1073)
==9878==    by 0x431299: runshfunc (exec.c:5040)
==9878==    by 0x430E76: doshfunc (exec.c:4920)
==9878==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9878== 
==9878== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9880== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9880-by-pythonnut-on-???
==9880== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9880-by-pythonnut-on-???
==9880== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9880-by-pythonnut-on-???
==9880== 
==9880== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9880== don't want to do, unless you know exactly what you're doing,
==9880== or are doing some strange experiment):
==9880==   /usr/lib/valgrind/../../bin/vgdb --pid=9880 ...command...
==9880== 
==9880== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9880==   /path/to/gdb ./zsh
==9880== and then give GDB the following command
==9880==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9880
==9880== --pid is optional if only one valgrind process is running
==9880== 
client request: code 4d430005,  addr 0xFFEFF23BC,  len 4
--9862-- Caught __NR_exit; running __libc_freeres()
--9862-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9862== 
==9862== HEAP SUMMARY:
==9862==     in use at exit: 3,116,519 bytes in 69,019 blocks
==9862==   total heap usage: 1,585,285 allocs, 1,516,266 frees, 127,941,407 bytes allocated
==9862== 
==9862== Searching for pointers to 69,019 not-freed blocks
--9862--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9862--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9862--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9862--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9862--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9862--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9862--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9862--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9862--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9862--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9862--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9862--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9862--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9862--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9862--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9862--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9862--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9862--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9862--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9862--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9862--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9862--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9862--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9862--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9862--   Scanning root segment: 0x701a000..0x701afff (4096)
--9862--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9862--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9862--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9862--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9862--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9862--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9862--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9862--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9862--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9862--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9862== Checked 4,772,312 bytes
==9862== 
==9862== LEAK SUMMARY:
==9862==    definitely lost: 2,189 bytes in 12 blocks
==9862==    indirectly lost: 6,756 bytes in 7 blocks
==9862==      possibly lost: 0 bytes in 0 blocks
==9862==    still reachable: 3,107,574 bytes in 69,000 blocks
==9862==         suppressed: 0 bytes in 0 blocks
==9862== Rerun with --leak-check=full to see details of leaked memory
==9862== 
==9862== Use --track-origins=yes to see where uninitialised values come from
==9862== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9862== 
==9862== 1 errors in context 1 of 2:
==9862== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9862==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9862==    by 0x488CD0: stringsubst (subst.c:301)
==9862==    by 0x48801B: prefork (subst.c:77)
==9862==    by 0x42B318: execcmd (exec.c:2619)
==9862==    by 0x428CA0: execpline2 (exec.c:1697)
==9862==    by 0x427FD2: execpline (exec.c:1484)
==9862==    by 0x427756: execlist (exec.c:1267)
==9862==    by 0x42717C: execode (exec.c:1073)
==9862==    by 0x431299: runshfunc (exec.c:5040)
==9862==    by 0x430E76: doshfunc (exec.c:4920)
==9862==    by 0x4302FB: execshfunc (exec.c:4557)
==9862==    by 0x42D8C1: execcmd (exec.c:3373)
==9862== 
==9862== 
==9862== 2 errors in context 2 of 2:
==9862== Conditional jump or move depends on uninitialised value(s)
==9862==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9862==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9862==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9862==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9862==    by 0x42D8E9: execcmd (exec.c:3378)
==9862==    by 0x428CA0: execpline2 (exec.c:1697)
==9862==    by 0x427FD2: execpline (exec.c:1484)
==9862==    by 0x42779A: execlist (exec.c:1275)
==9862==    by 0x42717C: execode (exec.c:1073)
==9862==    by 0x431299: runshfunc (exec.c:5040)
==9862==    by 0x430E76: doshfunc (exec.c:4920)
==9862==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9862== 
==9862== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9882-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF2CEC,  len 4
==9882== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9882-by-pythonnut-on-???
==9882== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9882-by-pythonnut-on-???
==9882== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9882-by-pythonnut-on-???
==9882== 
==9882== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9882== don't want to do, unless you know exactly what you're doing,
==9882== or are doing some strange experiment):
==9882==   /usr/lib/valgrind/../../bin/vgdb --pid=9882 ...command...
==9882== 
==9882== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9882==   /path/to/gdb ./zsh
==9882== and then give GDB the following command
==9882==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9882
==9882== --pid is optional if only one valgrind process is running
==9882== 
client request: code 4d430005,  addr 0xFFEFF2C4C,  len 4
--9882-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9882== 
==9882== HEAP SUMMARY:
==9882==     in use at exit: 3,116,409 bytes in 69,020 blocks
==9882==   total heap usage: 1,585,230 allocs, 1,516,210 frees, 127,890,776 bytes allocated
==9882== 
==9882== Searching for pointers to 69,020 not-freed blocks
--9882--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9882--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9882--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9882--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9882--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9882--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9882--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9882--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9882--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9882--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9882--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9882--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9882--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9882--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9882--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9882--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9882--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9882--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9882--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9882--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9882--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9882--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9882--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9882--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9882--   Scanning root segment: 0x701a000..0x701afff (4096)
--9882--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9882--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9882--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9882--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9882--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9882--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9882--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9882--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9882--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9882--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9882== Checked 4,773,392 bytes
==9882== 
==9882== LEAK SUMMARY:
==9882==    definitely lost: 2,189 bytes in 12 blocks
==9882==    indirectly lost: 6,756 bytes in 7 blocks
==9882==      possibly lost: 0 bytes in 0 blocks
==9882==    still reachable: 3,107,464 bytes in 69,001 blocks
==9882==         suppressed: 0 bytes in 0 blocks
==9882== Rerun with --leak-check=full to see details of leaked memory
==9882== 
==9882== Use --track-origins=yes to see where uninitialised values come from
==9882== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9882== 
==9882== 1 errors in context 1 of 2:
==9882== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9882==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9882==    by 0x488CD0: stringsubst (subst.c:301)
==9882==    by 0x48801B: prefork (subst.c:77)
==9882==    by 0x42B318: execcmd (exec.c:2619)
==9882==    by 0x428CA0: execpline2 (exec.c:1697)
==9882==    by 0x427FD2: execpline (exec.c:1484)
==9882==    by 0x427756: execlist (exec.c:1267)
==9882==    by 0x42717C: execode (exec.c:1073)
==9882==    by 0x431299: runshfunc (exec.c:5040)
==9882==    by 0x430E76: doshfunc (exec.c:4920)
==9882==    by 0x4302FB: execshfunc (exec.c:4557)
==9882==    by 0x42D8C1: execcmd (exec.c:3373)
==9882== 
==9882== 
==9882== 2 errors in context 2 of 2:
==9882== Conditional jump or move depends on uninitialised value(s)
==9882==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9882==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9882==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9882==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9882==    by 0x42D8E9: execcmd (exec.c:3378)
==9882==    by 0x428CA0: execpline2 (exec.c:1697)
==9882==    by 0x427FD2: execpline (exec.c:1484)
==9882==    by 0x42779A: execlist (exec.c:1275)
==9882==    by 0x42717C: execode (exec.c:1073)
==9882==    by 0x431299: runshfunc (exec.c:5040)
==9882==    by 0x430E76: doshfunc (exec.c:4920)
==9882==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9882== 
==9882== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9881-- Caught __NR_exit; running __libc_freeres()
==9881== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9881-by-pythonnut-on-???
==9881== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9881-by-pythonnut-on-???
==9881== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9881-by-pythonnut-on-???
==9881== 
==9881== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9881== don't want to do, unless you know exactly what you're doing,
==9881== or are doing some strange experiment):
==9881==   /usr/lib/valgrind/../../bin/vgdb --pid=9881 ...command...
==9881== 
==9881== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9881==   /path/to/gdb ./zsh
==9881== and then give GDB the following command
==9881==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9881
==9881== --pid is optional if only one valgrind process is running
==9881== 
--9881-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9881== 
==9881== HEAP SUMMARY:
==9881==     in use at exit: 3,116,345 bytes in 69,017 blocks
==9881==   total heap usage: 1,585,235 allocs, 1,516,218 frees, 127,891,632 bytes allocated
==9881== 
==9881== Searching for pointers to 69,017 not-freed blocks
--9881--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9881--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9881--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9881--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9881--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9881--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9881--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9881--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9881--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9881--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9881--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9881--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9881--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9881--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9881--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9881--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9881--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9881--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9881--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9881--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9881--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9881--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9881--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9881--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9881--   Scanning root segment: 0x701a000..0x701afff (4096)
--9881--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9881--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9881--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9881--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9881--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9881--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9881--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9881--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9881--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9881--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9881== Checked 4,772,704 bytes
==9881== 
==9881== LEAK SUMMARY:
==9881==    definitely lost: 2,189 bytes in 12 blocks
==9881==    indirectly lost: 6,756 bytes in 7 blocks
==9881==      possibly lost: 0 bytes in 0 blocks
==9881==    still reachable: 3,107,400 bytes in 68,998 blocks
==9881==         suppressed: 0 bytes in 0 blocks
==9881== Rerun with --leak-check=full to see details of leaked memory
==9881== 
==9881== Use --track-origins=yes to see where uninitialised values come from
==9881== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9881== 
==9881== 1 errors in context 1 of 2:
==9881== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9881==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9881==    by 0x488CD0: stringsubst (subst.c:301)
==9881==    by 0x48801B: prefork (subst.c:77)
==9881==    by 0x42B318: execcmd (exec.c:2619)
==9881==    by 0x428CA0: execpline2 (exec.c:1697)
==9881==    by 0x427FD2: execpline (exec.c:1484)
==9881==    by 0x427756: execlist (exec.c:1267)
==9881==    by 0x42717C: execode (exec.c:1073)
==9881==    by 0x431299: runshfunc (exec.c:5040)
==9881==    by 0x430E76: doshfunc (exec.c:4920)
==9881==    by 0x4302FB: execshfunc (exec.c:4557)
==9881==    by 0x42D8C1: execcmd (exec.c:3373)
==9881== 
==9881== 
==9881== 2 errors in context 2 of 2:
==9881== Conditional jump or move depends on uninitialised value(s)
==9881==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9881==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9881==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9881==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9881==    by 0x42D8E9: execcmd (exec.c:3378)
==9881==    by 0x428CA0: execpline2 (exec.c:1697)
==9881==    by 0x427FD2: execpline (exec.c:1484)
==9881==    by 0x42779A: execlist (exec.c:1275)
==9881==    by 0x42717C: execode (exec.c:1073)
==9881==    by 0x431299: runshfunc (exec.c:5040)
==9881==    by 0x430E76: doshfunc (exec.c:4920)
==9881==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9881== 
==9881== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9886-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF188C,  len 4
==9886== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9886-by-pythonnut-on-???
==9886== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9886-by-pythonnut-on-???
==9886== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9886-by-pythonnut-on-???
==9886== 
==9886== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9886== don't want to do, unless you know exactly what you're doing,
==9886== or are doing some strange experiment):
==9886==   /usr/lib/valgrind/../../bin/vgdb --pid=9886 ...command...
==9886== 
==9886== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9886==   /path/to/gdb ./zsh
==9886== and then give GDB the following command
==9886==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9886
==9886== --pid is optional if only one valgrind process is running
==9886== 
client request: code 4d430005,  addr 0xFFEFF17EC,  len 4
--9886-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9886== 
==9886== HEAP SUMMARY:
==9886==     in use at exit: 3,116,661 bytes in 69,022 blocks
==9886==   total heap usage: 1,585,264 allocs, 1,516,242 frees, 127,904,107 bytes allocated
==9886== 
==9886== Searching for pointers to 69,022 not-freed blocks
--9886--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9886--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9886--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9886--   Scanning root segment: 0x4037000..0x403afff (16384)
--9886--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9886--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9886--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9886--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9886--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9886--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9886--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9886--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9886--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9886--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9886--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9886--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9886--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9886--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9886--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9886--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9886--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9886--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9886--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9886--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9886--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9886--   Scanning root segment: 0x701a000..0x701afff (4096)
--9886--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9886--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9886--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9886--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9886--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9886--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9886--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9886--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9886--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9886--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9886== Checked 4,791,328 bytes
==9886== 
==9886== LEAK SUMMARY:
==9886==    definitely lost: 2,189 bytes in 12 blocks
==9886==    indirectly lost: 6,756 bytes in 7 blocks
==9886==      possibly lost: 0 bytes in 0 blocks
==9886==    still reachable: 3,107,716 bytes in 69,003 blocks
==9886==         suppressed: 0 bytes in 0 blocks
==9886== Rerun with --leak-check=full to see details of leaked memory
==9886== 
==9886== Use --track-origins=yes to see where uninitialised values come from
==9886== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9886== 
==9886== 1 errors in context 1 of 2:
==9886== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9886==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9886==    by 0x488CD0: stringsubst (subst.c:301)
==9886==    by 0x48801B: prefork (subst.c:77)
==9886==    by 0x42B318: execcmd (exec.c:2619)
==9886==    by 0x428CA0: execpline2 (exec.c:1697)
==9886==    by 0x427FD2: execpline (exec.c:1484)
==9886==    by 0x427756: execlist (exec.c:1267)
==9886==    by 0x42717C: execode (exec.c:1073)
==9886==    by 0x431299: runshfunc (exec.c:5040)
==9886==    by 0x430E76: doshfunc (exec.c:4920)
==9886==    by 0x4302FB: execshfunc (exec.c:4557)
==9886==    by 0x42D8C1: execcmd (exec.c:3373)
==9886== 
==9886== 
==9886== 2 errors in context 2 of 2:
==9886== Conditional jump or move depends on uninitialised value(s)
==9886==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9886==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9886==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9886==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9886==    by 0x42D8E9: execcmd (exec.c:3378)
==9886==    by 0x428CA0: execpline2 (exec.c:1697)
==9886==    by 0x427FD2: execpline (exec.c:1484)
==9886==    by 0x42779A: execlist (exec.c:1275)
==9886==    by 0x42717C: execode (exec.c:1073)
==9886==    by 0x431299: runshfunc (exec.c:5040)
==9886==    by 0x430E76: doshfunc (exec.c:4920)
==9886==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9886== 
==9886== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9885-- Caught __NR_exit; running __libc_freeres()
==9885== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9885-by-pythonnut-on-???
==9885== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9885-by-pythonnut-on-???
==9885== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9885-by-pythonnut-on-???
==9885== 
==9885== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9885== don't want to do, unless you know exactly what you're doing,
==9885== or are doing some strange experiment):
==9885==   /usr/lib/valgrind/../../bin/vgdb --pid=9885 ...command...
==9885== 
==9885== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9885==   /path/to/gdb ./zsh
==9885== and then give GDB the following command
==9885==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9885
==9885== --pid is optional if only one valgrind process is running
==9885== 
--9885-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9885== 
==9885== HEAP SUMMARY:
==9885==     in use at exit: 3,116,660 bytes in 69,023 blocks
==9885==   total heap usage: 1,585,260 allocs, 1,516,237 frees, 127,900,555 bytes allocated
==9885== 
==9885== Searching for pointers to 69,023 not-freed blocks
--9885--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9885--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9885--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9885--   Scanning root segment: 0x4037000..0x403afff (16384)
--9885--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9885--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9885--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9885--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9885--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9885--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9885--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9885--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9885--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9885--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9885--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9885--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9885--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9885--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9885--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9885--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9885--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9885--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9885--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9885--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9885--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9885--   Scanning root segment: 0x701a000..0x701afff (4096)
--9885--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9885--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9885--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9885--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9885--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9885--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9885--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9885--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9885--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9885--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9885== Checked 4,791,008 bytes
==9885== 
==9885== LEAK SUMMARY:
==9885==    definitely lost: 2,189 bytes in 12 blocks
==9885==    indirectly lost: 6,756 bytes in 7 blocks
==9885==      possibly lost: 0 bytes in 0 blocks
==9885==    still reachable: 3,107,715 bytes in 69,004 blocks
==9885==         suppressed: 0 bytes in 0 blocks
==9885== Rerun with --leak-check=full to see details of leaked memory
==9885== 
==9885== Use --track-origins=yes to see where uninitialised values come from
==9885== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9885== 
==9885== 1 errors in context 1 of 2:
==9885== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9885==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9885==    by 0x488CD0: stringsubst (subst.c:301)
==9885==    by 0x48801B: prefork (subst.c:77)
==9885==    by 0x42B318: execcmd (exec.c:2619)
==9885==    by 0x428CA0: execpline2 (exec.c:1697)
==9885==    by 0x427FD2: execpline (exec.c:1484)
==9885==    by 0x427756: execlist (exec.c:1267)
==9885==    by 0x42717C: execode (exec.c:1073)
==9885==    by 0x431299: runshfunc (exec.c:5040)
==9885==    by 0x430E76: doshfunc (exec.c:4920)
==9885==    by 0x4302FB: execshfunc (exec.c:4557)
==9885==    by 0x42D8C1: execcmd (exec.c:3373)
==9885== 
==9885== 
==9885== 2 errors in context 2 of 2:
==9885== Conditional jump or move depends on uninitialised value(s)
==9885==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9885==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9885==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9885==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9885==    by 0x42D8E9: execcmd (exec.c:3378)
==9885==    by 0x428CA0: execpline2 (exec.c:1697)
==9885==    by 0x427FD2: execpline (exec.c:1484)
==9885==    by 0x42779A: execlist (exec.c:1275)
==9885==    by 0x42717C: execode (exec.c:1073)
==9885==    by 0x431299: runshfunc (exec.c:5040)
==9885==    by 0x430E76: doshfunc (exec.c:4920)
==9885==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9885== 
==9885== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1DDC,  len 4
--9891-- Caught __NR_exit; running __libc_freeres()
==9891== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9891-by-pythonnut-on-???
==9891== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9891-by-pythonnut-on-???
==9891== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9891-by-pythonnut-on-???
==9891== 
==9891== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9891== don't want to do, unless you know exactly what you're doing,
==9891== or are doing some strange experiment):
==9891==   /usr/lib/valgrind/../../bin/vgdb --pid=9891 ...command...
==9891== 
==9891== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9891==   /path/to/gdb ./zsh
==9891== and then give GDB the following command
==9891==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9891
==9891== --pid is optional if only one valgrind process is running
==9891== 
--9891-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9891== 
==9891== HEAP SUMMARY:
==9891==     in use at exit: 3,116,952 bytes in 69,028 blocks
==9891==   total heap usage: 1,585,271 allocs, 1,516,243 frees, 127,905,695 bytes allocated
==9891== 
==9891== Searching for pointers to 69,028 not-freed blocks
--9891--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9891--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9891--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9891--   Scanning root segment: 0x4037000..0x403afff (16384)
--9891--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9891--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9891--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9891--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9891--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9891--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9891--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9891--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9891--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9891--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9891--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9891--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9891--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9891--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9891--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9891--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9891--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9891--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9891--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9891--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9891--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9891--   Scanning root segment: 0x701a000..0x701afff (4096)
--9891--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9891--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9891--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9891--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9891--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9891--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9891--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9891--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9891--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9891--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9891== Checked 4,791,024 bytes
==9891== 
==9891== LEAK SUMMARY:
==9891==    definitely lost: 2,189 bytes in 12 blocks
==9891==    indirectly lost: 6,756 bytes in 7 blocks
==9891==      possibly lost: 0 bytes in 0 blocks
==9891==    still reachable: 3,108,007 bytes in 69,009 blocks
==9891==         suppressed: 0 bytes in 0 blocks
==9891== Rerun with --leak-check=full to see details of leaked memory
==9891== 
==9891== Use --track-origins=yes to see where uninitialised values come from
==9891== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9891== 
==9891== 1 errors in context 1 of 2:
==9891== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9891==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9891==    by 0x488CD0: stringsubst (subst.c:301)
==9891==    by 0x48801B: prefork (subst.c:77)
==9891==    by 0x42B318: execcmd (exec.c:2619)
==9891==    by 0x428CA0: execpline2 (exec.c:1697)
==9891==    by 0x427FD2: execpline (exec.c:1484)
==9891==    by 0x427756: execlist (exec.c:1267)
==9891==    by 0x42717C: execode (exec.c:1073)
==9891==    by 0x431299: runshfunc (exec.c:5040)
==9891==    by 0x430E76: doshfunc (exec.c:4920)
==9891==    by 0x4302FB: execshfunc (exec.c:4557)
==9891==    by 0x42D8C1: execcmd (exec.c:3373)
==9891== 
==9891== 
==9891== 2 errors in context 2 of 2:
==9891== Conditional jump or move depends on uninitialised value(s)
==9891==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9891==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9891==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9891==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9891==    by 0x42D8E9: execcmd (exec.c:3378)
==9891==    by 0x428CA0: execpline2 (exec.c:1697)
==9891==    by 0x427FD2: execpline (exec.c:1484)
==9891==    by 0x42779A: execlist (exec.c:1275)
==9891==    by 0x42717C: execode (exec.c:1073)
==9891==    by 0x431299: runshfunc (exec.c:5040)
==9891==    by 0x430E76: doshfunc (exec.c:4920)
==9891==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9891== 
==9891== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF192C,  len 4
--9893-- Caught __NR_exit; running __libc_freeres()
==9893== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9893-by-pythonnut-on-???
==9893== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9893-by-pythonnut-on-???
==9893== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9893-by-pythonnut-on-???
==9893== 
==9893== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9893== don't want to do, unless you know exactly what you're doing,
==9893== or are doing some strange experiment):
==9893==   /usr/lib/valgrind/../../bin/vgdb --pid=9893 ...command...
==9893== 
==9893== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9893==   /path/to/gdb ./zsh
==9893== and then give GDB the following command
==9893==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9893
==9893== --pid is optional if only one valgrind process is running
==9893== 
--9893-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9893== 
==9893== HEAP SUMMARY:
==9893==     in use at exit: 3,116,981 bytes in 69,029 blocks
==9893==   total heap usage: 1,585,276 allocs, 1,516,247 frees, 127,907,836 bytes allocated
==9893== 
==9893== Searching for pointers to 69,029 not-freed blocks
--9893--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9893--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9893--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9893--   Scanning root segment: 0x4037000..0x403afff (16384)
--9893--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9893--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9893--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9893--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9893--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9893--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9893--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9893--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9893--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9893--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9893--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9893--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9893--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9893--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9893--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9893--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9893--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9893--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9893--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9893--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9893--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9893--   Scanning root segment: 0x701a000..0x701afff (4096)
--9893--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9893--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9893--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9893--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9893--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9893--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9893--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9893--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9893--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9893--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9893== Checked 4,791,320 bytes
==9893== 
==9893== LEAK SUMMARY:
==9893==    definitely lost: 2,189 bytes in 12 blocks
==9893==    indirectly lost: 6,756 bytes in 7 blocks
==9893==      possibly lost: 0 bytes in 0 blocks
==9893==    still reachable: 3,108,036 bytes in 69,010 blocks
==9893==         suppressed: 0 bytes in 0 blocks
==9893== Rerun with --leak-check=full to see details of leaked memory
==9893== 
==9893== Use --track-origins=yes to see where uninitialised values come from
==9893== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9893== 
==9893== 1 errors in context 1 of 2:
==9893== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9893==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9893==    by 0x488CD0: stringsubst (subst.c:301)
==9893==    by 0x48801B: prefork (subst.c:77)
==9893==    by 0x42B318: execcmd (exec.c:2619)
==9893==    by 0x428CA0: execpline2 (exec.c:1697)
==9893==    by 0x427FD2: execpline (exec.c:1484)
==9893==    by 0x427756: execlist (exec.c:1267)
==9893==    by 0x42717C: execode (exec.c:1073)
==9893==    by 0x431299: runshfunc (exec.c:5040)
==9893==    by 0x430E76: doshfunc (exec.c:4920)
==9893==    by 0x4302FB: execshfunc (exec.c:4557)
==9893==    by 0x42D8C1: execcmd (exec.c:3373)
==9893== 
==9893== 
==9893== 2 errors in context 2 of 2:
==9893== Conditional jump or move depends on uninitialised value(s)
==9893==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9893==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9893==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9893==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9893==    by 0x42D8E9: execcmd (exec.c:3378)
==9893==    by 0x428CA0: execpline2 (exec.c:1697)
==9893==    by 0x427FD2: execpline (exec.c:1484)
==9893==    by 0x42779A: execlist (exec.c:1275)
==9893==    by 0x42717C: execode (exec.c:1073)
==9893==    by 0x431299: runshfunc (exec.c:5040)
==9893==    by 0x430E76: doshfunc (exec.c:4920)
==9893==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9893== 
==9893== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF22AC,  len 4
client request: code 4d430005,  addr 0xFFEFF1C2C,  len 4
--9861-- Caught __NR_exit; running __libc_freeres()
--9861-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9861== 
==9861== HEAP SUMMARY:
==9861==     in use at exit: 3,115,109 bytes in 68,981 blocks
==9861==   total heap usage: 1,585,285 allocs, 1,516,304 frees, 127,911,776 bytes allocated
==9861== 
==9861== Searching for pointers to 68,981 not-freed blocks
--9861--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9861--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9861--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9861--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9861--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9861--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9861--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9861--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9861--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9861--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9861--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9861--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9861--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9861--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9861--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9861--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9861--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9861--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9861--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9861--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9861--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9861--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9861--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9861--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9861--   Scanning root segment: 0x701a000..0x701afff (4096)
--9861--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9861--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9861--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9861--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9861--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9861--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9861--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9861--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9861--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9861--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9861== Checked 4,769,168 bytes
==9861== 
==9861== LEAK SUMMARY:
==9861==    definitely lost: 2,189 bytes in 12 blocks
==9861==    indirectly lost: 6,756 bytes in 7 blocks
==9861==      possibly lost: 0 bytes in 0 blocks
==9861==    still reachable: 3,106,164 bytes in 68,962 blocks
==9861==         suppressed: 0 bytes in 0 blocks
==9861== Rerun with --leak-check=full to see details of leaked memory
==9861== 
==9861== Use --track-origins=yes to see where uninitialised values come from
==9861== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9861== 
==9861== 1 errors in context 1 of 2:
==9861== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9861==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9861==    by 0x488CD0: stringsubst (subst.c:301)
==9861==    by 0x48801B: prefork (subst.c:77)
==9861==    by 0x42B318: execcmd (exec.c:2619)
==9861==    by 0x428CA0: execpline2 (exec.c:1697)
==9861==    by 0x427FD2: execpline (exec.c:1484)
==9861==    by 0x427756: execlist (exec.c:1267)
==9861==    by 0x42717C: execode (exec.c:1073)
==9861==    by 0x431299: runshfunc (exec.c:5040)
==9861==    by 0x430E76: doshfunc (exec.c:4920)
==9861==    by 0x4302FB: execshfunc (exec.c:4557)
==9861==    by 0x42D8C1: execcmd (exec.c:3373)
==9861== 
==9861== 
==9861== 2 errors in context 2 of 2:
==9861== Conditional jump or move depends on uninitialised value(s)
==9861==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9861==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9861==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9861==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9861==    by 0x42D8E9: execcmd (exec.c:3378)
==9861==    by 0x428CA0: execpline2 (exec.c:1697)
==9861==    by 0x427FD2: execpline (exec.c:1484)
==9861==    by 0x42779A: execlist (exec.c:1275)
==9861==    by 0x42717C: execode (exec.c:1073)
==9861==    by 0x431299: runshfunc (exec.c:5040)
==9861==    by 0x430E76: doshfunc (exec.c:4920)
==9861==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9861== 
==9861== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
==9897== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9897-by-pythonnut-on-???
==9897== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9897-by-pythonnut-on-???
==9897== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9897-by-pythonnut-on-???
==9897== 
==9897== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9897== don't want to do, unless you know exactly what you're doing,
==9897== or are doing some strange experiment):
==9897==   /usr/lib/valgrind/../../bin/vgdb --pid=9897 ...command...
==9897== 
==9897== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9897==   /path/to/gdb ./zsh
==9897== and then give GDB the following command
==9897==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9897
==9897== --pid is optional if only one valgrind process is running
==9897== 
--9897-- Caught __NR_exit; running __libc_freeres()
--9897-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9897== 
==9897== HEAP SUMMARY:
==9897==     in use at exit: 3,113,934 bytes in 68,981 blocks
==9897==   total heap usage: 1,592,381 allocs, 1,523,400 frees, 128,702,342 bytes allocated
==9897== 
==9897== Searching for pointers to 68,981 not-freed blocks
--9897--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9897--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9897--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9897--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9897--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9897--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9897--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9897--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9897--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9897--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9897--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9897--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9897--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9897--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9897--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9897--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9897--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9897--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9897--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9897--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9897--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9897--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9897--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9897--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9897--   Scanning root segment: 0x701a000..0x701afff (4096)
--9897--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9897--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9897--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9897--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9897--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9897--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9897--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9897--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9897--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9897--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9897== Checked 4,770,240 bytes
==9897== 
==9897== LEAK SUMMARY:
==9897==    definitely lost: 2,189 bytes in 12 blocks
==9897==    indirectly lost: 6,756 bytes in 7 blocks
==9897==      possibly lost: 0 bytes in 0 blocks
==9897==    still reachable: 3,104,989 bytes in 68,962 blocks
==9897==         suppressed: 0 bytes in 0 blocks
==9897== Rerun with --leak-check=full to see details of leaked memory
==9897== 
==9897== Use --track-origins=yes to see where uninitialised values come from
==9897== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9897== 
==9897== 1 errors in context 1 of 2:
==9897== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9897==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9897==    by 0x488CD0: stringsubst (subst.c:301)
==9897==    by 0x48801B: prefork (subst.c:77)
==9897==    by 0x42B318: execcmd (exec.c:2619)
==9897==    by 0x428CA0: execpline2 (exec.c:1697)
==9897==    by 0x427FD2: execpline (exec.c:1484)
==9897==    by 0x427756: execlist (exec.c:1267)
==9897==    by 0x42717C: execode (exec.c:1073)
==9897==    by 0x431299: runshfunc (exec.c:5040)
==9897==    by 0x430E76: doshfunc (exec.c:4920)
==9897==    by 0x4302FB: execshfunc (exec.c:4557)
==9897==    by 0x42D8C1: execcmd (exec.c:3373)
==9897== 
==9897== 
==9897== 2 errors in context 2 of 2:
==9897== Conditional jump or move depends on uninitialised value(s)
==9897==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9897==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9897==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9897==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9897==    by 0x42D8E9: execcmd (exec.c:3378)
==9897==    by 0x428CA0: execpline2 (exec.c:1697)
==9897==    by 0x427FD2: execpline (exec.c:1484)
==9897==    by 0x42779A: execlist (exec.c:1275)
==9897==    by 0x42717C: execode (exec.c:1073)
==9897==    by 0x431299: runshfunc (exec.c:5040)
==9897==    by 0x430E76: doshfunc (exec.c:4920)
==9897==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9897== 
==9897== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9898== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9898-by-pythonnut-on-???
==9898== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9898-by-pythonnut-on-???
==9898== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9898-by-pythonnut-on-???
==9898== 
==9898== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9898== don't want to do, unless you know exactly what you're doing,
==9898== or are doing some strange experiment):
==9898==   /usr/lib/valgrind/../../bin/vgdb --pid=9898 ...command...
==9898== 
==9898== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9898==   /path/to/gdb ./zsh
==9898== and then give GDB the following command
==9898==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9898
==9898== --pid is optional if only one valgrind process is running
==9898== 
==9901== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9901-by-pythonnut-on-???
==9901== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9901-by-pythonnut-on-???
==9901== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9901-by-pythonnut-on-???
==9901== 
==9901== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9901== don't want to do, unless you know exactly what you're doing,
==9901== or are doing some strange experiment):
==9901==   /usr/lib/valgrind/../../bin/vgdb --pid=9901 ...command...
==9901== 
==9901== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9901==   /path/to/gdb ./zsh
==9901== and then give GDB the following command
==9901==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9901
==9901== --pid is optional if only one valgrind process is running
==9901== 
==9900== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9900-by-pythonnut-on-???
==9900== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9900-by-pythonnut-on-???
==9900== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9900-by-pythonnut-on-???
==9900== 
==9900== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9900== don't want to do, unless you know exactly what you're doing,
==9900== or are doing some strange experiment):
==9900==   /usr/lib/valgrind/../../bin/vgdb --pid=9900 ...command...
==9900== 
==9900== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9900==   /path/to/gdb ./zsh
==9900== and then give GDB the following command
==9900==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9900
==9900== --pid is optional if only one valgrind process is running
==9900== 
==9904== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9904-by-pythonnut-on-???
==9904== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9904-by-pythonnut-on-???
==9904== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9904-by-pythonnut-on-???
==9904== 
==9904== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9904== don't want to do, unless you know exactly what you're doing,
==9904== or are doing some strange experiment):
==9904==   /usr/lib/valgrind/../../bin/vgdb --pid=9904 ...command...
==9904== 
==9904== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9904==   /path/to/gdb ./zsh
==9904== and then give GDB the following command
==9904==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9904
==9904== --pid is optional if only one valgrind process is running
==9904== 
==9906== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9906-by-pythonnut-on-???
==9906== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9906-by-pythonnut-on-???
==9906== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9906-by-pythonnut-on-???
==9906== 
==9906== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9906== don't want to do, unless you know exactly what you're doing,
==9906== or are doing some strange experiment):
==9906==   /usr/lib/valgrind/../../bin/vgdb --pid=9906 ...command...
==9906== 
==9906== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9906==   /path/to/gdb ./zsh
==9906== and then give GDB the following command
==9906==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9906
==9906== --pid is optional if only one valgrind process is running
==9906== 
==9907== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9907-by-pythonnut-on-???
==9907== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9907-by-pythonnut-on-???
==9907== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9907-by-pythonnut-on-???
==9907== 
==9907== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9907== don't want to do, unless you know exactly what you're doing,
==9907== or are doing some strange experiment):
==9907==   /usr/lib/valgrind/../../bin/vgdb --pid=9907 ...command...
==9907== 
==9907== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9907==   /path/to/gdb ./zsh
==9907== and then give GDB the following command
==9907==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9907
==9907== --pid is optional if only one valgrind process is running
==9907== 
==9908== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9908-by-pythonnut-on-???
==9908== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9908-by-pythonnut-on-???
==9908== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9908-by-pythonnut-on-???
==9908== 
==9908== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9908== don't want to do, unless you know exactly what you're doing,
==9908== or are doing some strange experiment):
==9908==   /usr/lib/valgrind/../../bin/vgdb --pid=9908 ...command...
==9908== 
==9908== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9908==   /path/to/gdb ./zsh
==9908== and then give GDB the following command
==9908==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9908
==9908== --pid is optional if only one valgrind process is running
==9908== 
--9908-- Caught __NR_exit; running __libc_freeres()
==9911== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9911-by-pythonnut-on-???
==9911== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9911-by-pythonnut-on-???
==9911== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9911-by-pythonnut-on-???
==9911== 
==9911== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9911== don't want to do, unless you know exactly what you're doing,
==9911== or are doing some strange experiment):
==9911==   /usr/lib/valgrind/../../bin/vgdb --pid=9911 ...command...
==9911== 
==9911== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9911==   /path/to/gdb ./zsh
==9911== and then give GDB the following command
==9911==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9911
==9911== --pid is optional if only one valgrind process is running
==9911== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
--9904-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--9908-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9904-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9908== 
==9910== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9910-by-pythonnut-on-???
==9910== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9910-by-pythonnut-on-???
==9910== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9910-by-pythonnut-on-???
==9910== 
==9910== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9910== don't want to do, unless you know exactly what you're doing,
==9910== or are doing some strange experiment):
==9910==   /usr/lib/valgrind/../../bin/vgdb --pid=9910 ...command...
==9910== 
==9910== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9910==   /path/to/gdb ./zsh
==9910== and then give GDB the following command
==9910==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9910
==9910== --pid is optional if only one valgrind process is running
==9910== 
==9908== HEAP SUMMARY:
==9908==     in use at exit: 3,112,898 bytes in 68,969 blocks
==9908==   total heap usage: 1,592,169 allocs, 1,523,200 frees, 128,480,436 bytes allocated
==9908== 
--9910-- Caught __NR_exit; running __libc_freeres()
==9904== 
==9904== HEAP SUMMARY:
==9904==     in use at exit: 3,119,663 bytes in 69,189 blocks
==9904==   total heap usage: 1,592,603 allocs, 1,523,414 frees, 128,713,418 bytes allocated
==9904== 
==9908== Searching for pointers to 68,969 not-freed blocks
--9910-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9908--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9908--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9908--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9908--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9908--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9908--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9908--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9908--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9908--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9908--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9908--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9908--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9908--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9908--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9908--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9908--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9908--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9908--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9908--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9908--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9908--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9908--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9908--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9908--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9908--   Scanning root segment: 0x701a000..0x701afff (4096)
--9908--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9908--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9908--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9908--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9908--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9908--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9908--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9908--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9908--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9908--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9904== Searching for pointers to 69,189 not-freed blocks
--9904--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9904--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9904--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9904--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9904--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9904--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9904--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9904--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9904--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9904--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9904--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9904--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9904--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9904--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9904--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9904--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9904--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9904--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9904--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9904--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9904--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9904--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9904--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9904--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9904--   Scanning root segment: 0x701a000..0x701afff (4096)
--9904--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9904--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9904--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9904--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9904--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9904--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9904--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9904--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9904--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9904--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9910== 
==9910== HEAP SUMMARY:
==9910==     in use at exit: 3,114,049 bytes in 68,958 blocks
==9910==   total heap usage: 1,592,155 allocs, 1,523,197 frees, 128,591,332 bytes allocated
==9910== 
==9910== Searching for pointers to 68,958 not-freed blocks
--9910--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9910--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9910--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9910--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9910--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9910--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9910--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9910--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9910--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9910--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9910--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9910--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9910--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9910--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9910--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9910--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9910--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9910--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9910--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9910--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9910--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9910--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9910--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9910--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9910--   Scanning root segment: 0x701a000..0x701afff (4096)
--9910--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9910--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9910--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9910--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9910--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9910--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9910--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9910--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9910--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9910--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9904== Checked 4,779,408 bytes
==9904== 
==9908== Checked 4,768,144 bytes
==9908== 
==9904== LEAK SUMMARY:
==9904==    definitely lost: 2,189 bytes in 12 blocks
==9904==    indirectly lost: 6,756 bytes in 7 blocks
==9904==      possibly lost: 0 bytes in 0 blocks
==9904==    still reachable: 3,110,718 bytes in 69,170 blocks
==9904==         suppressed: 0 bytes in 0 blocks
==9904== Rerun with --leak-check=full to see details of leaked memory
==9904== 
==9904== Use --track-origins=yes to see where uninitialised values come from
==9904== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9904== 
==9904== 1 errors in context 1 of 2:
==9904== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9904==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9904==    by 0x488CD0: stringsubst (subst.c:301)
==9904==    by 0x48801B: prefork (subst.c:77)
==9904==    by 0x42B318: execcmd (exec.c:2619)
==9904==    by 0x428CA0: execpline2 (exec.c:1697)
==9904==    by 0x427FD2: execpline (exec.c:1484)
==9904==    by 0x427756: execlist (exec.c:1267)
==9904==    by 0x42717C: execode (exec.c:1073)
==9904==    by 0x431299: runshfunc (exec.c:5040)
==9904==    by 0x430E76: doshfunc (exec.c:4920)
==9904==    by 0x4302FB: execshfunc (exec.c:4557)
==9904==    by 0x42D8C1: execcmd (exec.c:3373)
==9904== 
==9904== 
==9904== 2 errors in context 2 of 2:
==9904== Conditional jump or move depends on uninitialised value(s)
==9904==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9904==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9904==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9904==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9904==    by 0x42D8E9: execcmd (exec.c:3378)
==9904==    by 0x428CA0: execpline2 (exec.c:1697)
==9904==    by 0x427FD2: execpline (exec.c:1484)
==9904==    by 0x42779A: execlist (exec.c:1275)
==9904==    by 0x42717C: execode (exec.c:1073)
==9904==    by 0x431299: runshfunc (exec.c:5040)
==9904==    by 0x430E76: doshfunc (exec.c:4920)
==9904==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9904== 
==9904== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9908== LEAK SUMMARY:
==9908==    definitely lost: 2,189 bytes in 12 blocks
==9908==    indirectly lost: 6,756 bytes in 7 blocks
==9908==      possibly lost: 0 bytes in 0 blocks
==9908==    still reachable: 3,103,953 bytes in 68,950 blocks
==9908==         suppressed: 0 bytes in 0 blocks
==9908== Rerun with --leak-check=full to see details of leaked memory
==9908== 
==9908== Use --track-origins=yes to see where uninitialised values come from
==9908== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9908== 
==9908== 1 errors in context 1 of 2:
==9908== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9908==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9908==    by 0x488CD0: stringsubst (subst.c:301)
==9908==    by 0x48801B: prefork (subst.c:77)
==9908==    by 0x42B318: execcmd (exec.c:2619)
==9908==    by 0x428CA0: execpline2 (exec.c:1697)
==9908==    by 0x427FD2: execpline (exec.c:1484)
==9908==    by 0x427756: execlist (exec.c:1267)
==9908==    by 0x42717C: execode (exec.c:1073)
==9908==    by 0x431299: runshfunc (exec.c:5040)
==9908==    by 0x430E76: doshfunc (exec.c:4920)
==9908==    by 0x4302FB: execshfunc (exec.c:4557)
==9908==    by 0x42D8C1: execcmd (exec.c:3373)
==9908== 
==9908== 
==9908== 2 errors in context 2 of 2:
==9908== Conditional jump or move depends on uninitialised value(s)
==9908==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9908==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9908==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9908==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9908==    by 0x42D8E9: execcmd (exec.c:3378)
==9908==    by 0x428CA0: execpline2 (exec.c:1697)
==9908==    by 0x427FD2: execpline (exec.c:1484)
==9908==    by 0x42779A: execlist (exec.c:1275)
==9908==    by 0x42717C: execode (exec.c:1073)
==9908==    by 0x431299: runshfunc (exec.c:5040)
==9908==    by 0x430E76: doshfunc (exec.c:4920)
==9908==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9908== 
==9908== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9901-- Caught __NR_exit; running __libc_freeres()
==9910== Checked 4,774,944 bytes
==9910== 
--9905-- Caught __NR_exit; running __libc_freeres()
==9905== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9905-by-pythonnut-on-???
==9905== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9905-by-pythonnut-on-???
==9905== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9905-by-pythonnut-on-???
==9905== 
==9905== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9905== don't want to do, unless you know exactly what you're doing,
==9905== or are doing some strange experiment):
==9905==   /usr/lib/valgrind/../../bin/vgdb --pid=9905 ...command...
==9905== 
==9905== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9905==   /path/to/gdb ./zsh
==9905== and then give GDB the following command
==9905==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9905
==9905== --pid is optional if only one valgrind process is running
==9905== 
==9910== LEAK SUMMARY:
==9910==    definitely lost: 2,189 bytes in 12 blocks
==9910==    indirectly lost: 6,756 bytes in 7 blocks
==9910==      possibly lost: 0 bytes in 0 blocks
==9910==    still reachable: 3,105,104 bytes in 68,939 blocks
==9910==         suppressed: 0 bytes in 0 blocks
==9910== Rerun with --leak-check=full to see details of leaked memory
==9910== 
==9910== Use --track-origins=yes to see where uninitialised values come from
==9910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9910== 
==9910== 1 errors in context 1 of 2:
==9910== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9910==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9910==    by 0x488CD0: stringsubst (subst.c:301)
==9910==    by 0x48801B: prefork (subst.c:77)
==9910==    by 0x42B318: execcmd (exec.c:2619)
==9910==    by 0x428CA0: execpline2 (exec.c:1697)
==9910==    by 0x427FD2: execpline (exec.c:1484)
==9910==    by 0x427756: execlist (exec.c:1267)
==9910==    by 0x42717C: execode (exec.c:1073)
==9910==    by 0x431299: runshfunc (exec.c:5040)
==9910==    by 0x430E76: doshfunc (exec.c:4920)
==9910==    by 0x4302FB: execshfunc (exec.c:4557)
==9910==    by 0x42D8C1: execcmd (exec.c:3373)
==9910== 
==9910== 
==9910== 2 errors in context 2 of 2:
==9910== Conditional jump or move depends on uninitialised value(s)
==9910==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9910==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9910==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9910==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9910==    by 0x42D8E9: execcmd (exec.c:3378)
==9910==    by 0x428CA0: execpline2 (exec.c:1697)
==9910==    by 0x427FD2: execpline (exec.c:1484)
==9910==    by 0x42779A: execlist (exec.c:1275)
==9910==    by 0x42717C: execode (exec.c:1073)
==9910==    by 0x431299: runshfunc (exec.c:5040)
==9910==    by 0x430E76: doshfunc (exec.c:4920)
==9910==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9910== 
==9910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9901-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9901== 
--9905-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9901== HEAP SUMMARY:
==9901==     in use at exit: 3,117,680 bytes in 69,117 blocks
==9901==   total heap usage: 1,592,181 allocs, 1,523,064 frees, 128,474,628 bytes allocated
==9901== 
==9905== 
==9905== HEAP SUMMARY:
==9905==     in use at exit: 3,112,834 bytes in 68,966 blocks
==9905==   total heap usage: 1,592,167 allocs, 1,523,201 frees, 128,480,195 bytes allocated
==9905== 
client request: code 4d430005,  addr 0xFFEFF073C,  len 4
==9901== Searching for pointers to 69,117 not-freed blocks
--9901--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9901--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9901--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9901--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9901--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9901--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9901--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9901--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9901--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9901--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9901--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9901--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9901--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9901--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9901--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9901--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9901--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9901--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9901--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9901--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9901--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9901--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9901--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9901--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9901--   Scanning root segment: 0x701a000..0x701afff (4096)
--9901--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9901--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9901--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9901--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9901--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9901--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9901--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9901--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9901--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9901--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9905== Searching for pointers to 68,966 not-freed blocks
--9905--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9905--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9905--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9905--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9905--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9905--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9905--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9905--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9905--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9905--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9905--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9905--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9905--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9905--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9905--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9905--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9905--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9905--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9905--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9905--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9905--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9905--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9905--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9905--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9905--   Scanning root segment: 0x701a000..0x701afff (4096)
--9905--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9905--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9905--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9905--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9905--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9905--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9905--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9905--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9905--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9905--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9901== Checked 4,775,600 bytes
==9901== 
==9905== Checked 4,767,456 bytes
==9905== 
==9901== LEAK SUMMARY:
==9901==    definitely lost: 2,189 bytes in 12 blocks
==9901==    indirectly lost: 6,756 bytes in 7 blocks
==9901==      possibly lost: 0 bytes in 0 blocks
==9901==    still reachable: 3,108,735 bytes in 69,098 blocks
==9901==         suppressed: 0 bytes in 0 blocks
==9901== Rerun with --leak-check=full to see details of leaked memory
==9901== 
==9901== Use --track-origins=yes to see where uninitialised values come from
==9901== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9901== 
==9901== 1 errors in context 1 of 2:
==9901== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9901==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9901==    by 0x488CD0: stringsubst (subst.c:301)
==9901==    by 0x48801B: prefork (subst.c:77)
==9901==    by 0x42B318: execcmd (exec.c:2619)
==9901==    by 0x428CA0: execpline2 (exec.c:1697)
==9901==    by 0x427FD2: execpline (exec.c:1484)
==9901==    by 0x427756: execlist (exec.c:1267)
==9901==    by 0x42717C: execode (exec.c:1073)
==9901==    by 0x431299: runshfunc (exec.c:5040)
==9901==    by 0x430E76: doshfunc (exec.c:4920)
==9901==    by 0x4302FB: execshfunc (exec.c:4557)
==9901==    by 0x42D8C1: execcmd (exec.c:3373)
==9901== 
==9901== 
==9901== 2 errors in context 2 of 2:
==9901== Conditional jump or move depends on uninitialised value(s)
==9901==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9901==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9901==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9901==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9901==    by 0x42D8E9: execcmd (exec.c:3378)
==9901==    by 0x428CA0: execpline2 (exec.c:1697)
==9901==    by 0x427FD2: execpline (exec.c:1484)
==9901==    by 0x42779A: execlist (exec.c:1275)
==9901==    by 0x42717C: execode (exec.c:1073)
==9901==    by 0x431299: runshfunc (exec.c:5040)
==9901==    by 0x430E76: doshfunc (exec.c:4920)
==9901==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9901== 
==9901== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9905== LEAK SUMMARY:
==9905==    definitely lost: 2,189 bytes in 12 blocks
==9905==    indirectly lost: 6,756 bytes in 7 blocks
==9905==      possibly lost: 0 bytes in 0 blocks
==9905==    still reachable: 3,103,889 bytes in 68,947 blocks
==9905==         suppressed: 0 bytes in 0 blocks
==9905== Rerun with --leak-check=full to see details of leaked memory
==9905== 
==9905== Use --track-origins=yes to see where uninitialised values come from
==9905== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9905== 
==9905== 1 errors in context 1 of 2:
==9905== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9905==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9905==    by 0x488CD0: stringsubst (subst.c:301)
==9905==    by 0x48801B: prefork (subst.c:77)
==9905==    by 0x42B318: execcmd (exec.c:2619)
==9905==    by 0x428CA0: execpline2 (exec.c:1697)
==9905==    by 0x427FD2: execpline (exec.c:1484)
==9905==    by 0x427756: execlist (exec.c:1267)
==9905==    by 0x42717C: execode (exec.c:1073)
==9905==    by 0x431299: runshfunc (exec.c:5040)
==9905==    by 0x430E76: doshfunc (exec.c:4920)
==9905==    by 0x4302FB: execshfunc (exec.c:4557)
==9905==    by 0x42D8C1: execcmd (exec.c:3373)
==9905== 
==9905== 
==9905== 2 errors in context 2 of 2:
==9905== Conditional jump or move depends on uninitialised value(s)
==9905==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9905==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9905==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9905==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9905==    by 0x42D8E9: execcmd (exec.c:3378)
==9905==    by 0x428CA0: execpline2 (exec.c:1697)
==9905==    by 0x427FD2: execpline (exec.c:1484)
==9905==    by 0x42779A: execlist (exec.c:1275)
==9905==    by 0x42717C: execode (exec.c:1073)
==9905==    by 0x431299: runshfunc (exec.c:5040)
==9905==    by 0x430E76: doshfunc (exec.c:4920)
==9905==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9905== 
==9905== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9899== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9899-by-pythonnut-on-???
==9899== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9899-by-pythonnut-on-???
==9899== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9899-by-pythonnut-on-???
==9899== 
==9899== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9899== don't want to do, unless you know exactly what you're doing,
==9899== or are doing some strange experiment):
==9899==   /usr/lib/valgrind/../../bin/vgdb --pid=9899 ...command...
==9899== 
==9899== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9899==   /path/to/gdb ./zsh
==9899== and then give GDB the following command
==9899==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9899
==9899== --pid is optional if only one valgrind process is running
==9899== 
--9899-- Caught __NR_exit; running __libc_freeres()
--9930-- Caught __NR_exit; running __libc_freeres()
==9930== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9930-by-pythonnut-on-???
==9930== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9930-by-pythonnut-on-???
==9930== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9930-by-pythonnut-on-???
==9930== 
==9930== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9930== don't want to do, unless you know exactly what you're doing,
==9930== or are doing some strange experiment):
==9930==   /usr/lib/valgrind/../../bin/vgdb --pid=9930 ...command...
==9930== 
==9930== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9930==   /path/to/gdb ./zsh
==9930== and then give GDB the following command
==9930==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9930
==9930== --pid is optional if only one valgrind process is running
==9930== 
--9899-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9899== 
--9930-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9899== HEAP SUMMARY:
==9899==     in use at exit: 3,115,695 bytes in 69,046 blocks
==9899==   total heap usage: 1,592,139 allocs, 1,523,093 frees, 128,477,878 bytes allocated
==9899== 
==9930== 
==9930== HEAP SUMMARY:
==9930==     in use at exit: 3,112,841 bytes in 68,966 blocks
==9930==   total heap usage: 1,592,182 allocs, 1,523,216 frees, 128,485,193 bytes allocated
==9930== 
==9899== Searching for pointers to 69,046 not-freed blocks
--9899--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9899--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9899--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9899--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9899--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9899--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9899--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9899--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9899--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9899--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9899--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9899--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9899--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9899--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9899--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9899--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9899--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9899--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9899--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9899--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9899--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9899--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9899--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9899--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9899--   Scanning root segment: 0x701a000..0x701afff (4096)
--9899--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9899--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9899--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9899--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9899--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9899--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9899--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9899--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9899--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9899--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9930== Searching for pointers to 68,966 not-freed blocks
--9930--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9930--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9930--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9930--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9930--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9930--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9930--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9930--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9930--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9930--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9930--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9930--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9930--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9930--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9930--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9930--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9930--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9930--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9930--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9930--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9930--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9930--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9930--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9930--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9930--   Scanning root segment: 0x701a000..0x701afff (4096)
--9930--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9930--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9930--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9930--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9930--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9930--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9930--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9930--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9930--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9930--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9899== Checked 4,772,608 bytes
==9899== 
==9930== Checked 4,767,592 bytes
==9930== 
==9899== LEAK SUMMARY:
==9899==    definitely lost: 2,189 bytes in 12 blocks
==9899==    indirectly lost: 6,756 bytes in 7 blocks
==9899==      possibly lost: 0 bytes in 0 blocks
==9899==    still reachable: 3,106,750 bytes in 69,027 blocks
==9899==         suppressed: 0 bytes in 0 blocks
==9899== Rerun with --leak-check=full to see details of leaked memory
==9899== 
==9899== Use --track-origins=yes to see where uninitialised values come from
==9899== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9899== 
==9899== 1 errors in context 1 of 2:
==9899== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9899==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9899==    by 0x488CD0: stringsubst (subst.c:301)
==9899==    by 0x48801B: prefork (subst.c:77)
==9899==    by 0x42B318: execcmd (exec.c:2619)
==9899==    by 0x428CA0: execpline2 (exec.c:1697)
==9899==    by 0x427FD2: execpline (exec.c:1484)
==9899==    by 0x427756: execlist (exec.c:1267)
==9899==    by 0x42717C: execode (exec.c:1073)
==9899==    by 0x431299: runshfunc (exec.c:5040)
==9899==    by 0x430E76: doshfunc (exec.c:4920)
==9899==    by 0x4302FB: execshfunc (exec.c:4557)
==9899==    by 0x42D8C1: execcmd (exec.c:3373)
==9899== 
==9899== 
==9899== 2 errors in context 2 of 2:
==9899== Conditional jump or move depends on uninitialised value(s)
==9899==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9899==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9899==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9899==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9899==    by 0x42D8E9: execcmd (exec.c:3378)
==9899==    by 0x428CA0: execpline2 (exec.c:1697)
==9899==    by 0x427FD2: execpline (exec.c:1484)
==9899==    by 0x42779A: execlist (exec.c:1275)
==9899==    by 0x42717C: execode (exec.c:1073)
==9899==    by 0x431299: runshfunc (exec.c:5040)
==9899==    by 0x430E76: doshfunc (exec.c:4920)
==9899==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9899== 
==9899== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9912-- Caught __NR_exit; running __libc_freeres()
==9930== LEAK SUMMARY:
==9930==    definitely lost: 2,189 bytes in 12 blocks
==9930==    indirectly lost: 6,756 bytes in 7 blocks
==9930==      possibly lost: 0 bytes in 0 blocks
==9930==    still reachable: 3,103,896 bytes in 68,947 blocks
==9930==         suppressed: 0 bytes in 0 blocks
==9930== Rerun with --leak-check=full to see details of leaked memory
==9930== 
==9930== Use --track-origins=yes to see where uninitialised values come from
==9930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9930== 
==9930== 1 errors in context 1 of 2:
==9930== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9930==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9930==    by 0x488CD0: stringsubst (subst.c:301)
==9930==    by 0x48801B: prefork (subst.c:77)
==9930==    by 0x42B318: execcmd (exec.c:2619)
==9930==    by 0x428CA0: execpline2 (exec.c:1697)
==9930==    by 0x427FD2: execpline (exec.c:1484)
==9930==    by 0x427756: execlist (exec.c:1267)
==9930==    by 0x42717C: execode (exec.c:1073)
==9930==    by 0x431299: runshfunc (exec.c:5040)
==9930==    by 0x430E76: doshfunc (exec.c:4920)
==9930==    by 0x4302FB: execshfunc (exec.c:4557)
==9930==    by 0x42D8C1: execcmd (exec.c:3373)
==9930== 
==9930== 
==9930== 2 errors in context 2 of 2:
==9930== Conditional jump or move depends on uninitialised value(s)
==9930==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9930==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9930==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9930==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9930==    by 0x42D8E9: execcmd (exec.c:3378)
==9930==    by 0x428CA0: execpline2 (exec.c:1697)
==9930==    by 0x427FD2: execpline (exec.c:1484)
==9930==    by 0x42779A: execlist (exec.c:1275)
==9930==    by 0x42717C: execode (exec.c:1073)
==9930==    by 0x431299: runshfunc (exec.c:5040)
==9930==    by 0x430E76: doshfunc (exec.c:4920)
==9930==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9930== 
==9930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9912== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9912-by-pythonnut-on-???
==9912== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9912-by-pythonnut-on-???
==9912== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9912-by-pythonnut-on-???
==9912== 
==9912== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9912== don't want to do, unless you know exactly what you're doing,
==9912== or are doing some strange experiment):
==9912==   /usr/lib/valgrind/../../bin/vgdb --pid=9912 ...command...
==9912== 
==9912== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9912==   /path/to/gdb ./zsh
==9912== and then give GDB the following command
==9912==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9912
==9912== --pid is optional if only one valgrind process is running
==9912== 
--9912-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9965== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9965-by-pythonnut-on-???
==9965== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9965-by-pythonnut-on-???
==9965== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9965-by-pythonnut-on-???
==9965== 
==9965== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9965== don't want to do, unless you know exactly what you're doing,
==9965== or are doing some strange experiment):
==9965==   /usr/lib/valgrind/../../bin/vgdb --pid=9965 ...command...
==9965== 
==9965== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9965==   /path/to/gdb ./zsh
==9965== and then give GDB the following command
==9965==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9965
==9965== --pid is optional if only one valgrind process is running
==9965== 
--9965-- Caught __NR_exit; running __libc_freeres()
==9912== 
==9912== HEAP SUMMARY:
==9912==     in use at exit: 3,114,408 bytes in 68,966 blocks
==9912==   total heap usage: 1,592,170 allocs, 1,523,204 frees, 128,595,347 bytes allocated
==9912== 
--9964-- Caught __NR_exit; running __libc_freeres()
==9964== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9964-by-pythonnut-on-???
==9964== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9964-by-pythonnut-on-???
==9964== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9964-by-pythonnut-on-???
==9964== 
==9964== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9964== don't want to do, unless you know exactly what you're doing,
==9964== or are doing some strange experiment):
==9964==   /usr/lib/valgrind/../../bin/vgdb --pid=9964 ...command...
==9964== 
==9964== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9964==   /path/to/gdb ./zsh
==9964== and then give GDB the following command
==9964==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9964
==9964== --pid is optional if only one valgrind process is running
==9964== 
--9965-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9912== Searching for pointers to 68,966 not-freed blocks
--9912--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9912--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9912--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9912--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9912--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9912--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9912--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9912--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9912--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9912--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9912--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9912--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9912--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9912--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9912--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9912--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9912--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9912--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9912--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9912--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9912--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9912--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9912--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9912--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9912--   Scanning root segment: 0x701a000..0x701afff (4096)
--9912--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9912--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9912--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9912--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9912--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9912--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9912--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9964-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9912--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9912--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9912--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9965== 
==9965== HEAP SUMMARY:
==9965==     in use at exit: 3,117,442 bytes in 69,113 blocks
==9965==   total heap usage: 1,592,159 allocs, 1,523,046 frees, 128,472,711 bytes allocated
==9965== 
==9964== 
==9964== HEAP SUMMARY:
==9964==     in use at exit: 3,113,001 bytes in 68,967 blocks
==9964==   total heap usage: 1,592,199 allocs, 1,523,232 frees, 128,490,044 bytes allocated
==9964== 
==9965== Searching for pointers to 69,113 not-freed blocks
--9965--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9965--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9965--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9965--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9965--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9965--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9965--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9965--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9965--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9965--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9965--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9965--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9965--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9965--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9965--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9965--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9965--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9965--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9965--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9965--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9965--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9965--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9965--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9965--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9965--   Scanning root segment: 0x701a000..0x701afff (4096)
--9965--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9965--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9965--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9965--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9965--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9965--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9965--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9965--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9965--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9965--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9964== Searching for pointers to 68,967 not-freed blocks
--9964--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9964--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9964--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9964--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9964--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9964--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9964--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9964--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9964--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9964--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9964--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9964--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9964--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9964--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9964--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9964--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9964--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9964--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9964--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9964--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9964--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9964--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9964--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9964--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9964--   Scanning root segment: 0x701a000..0x701afff (4096)
--9964--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9964--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9964--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9964--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9964--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9964--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9964--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9964--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9964--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9964--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9912== Checked 4,775,008 bytes
==9912== 
==9912== LEAK SUMMARY:
==9912==    definitely lost: 2,189 bytes in 12 blocks
==9912==    indirectly lost: 6,756 bytes in 7 blocks
==9912==      possibly lost: 0 bytes in 0 blocks
==9912==    still reachable: 3,105,463 bytes in 68,947 blocks
==9912==         suppressed: 0 bytes in 0 blocks
==9912== Rerun with --leak-check=full to see details of leaked memory
==9912== 
==9912== Use --track-origins=yes to see where uninitialised values come from
==9912== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9912== 
==9912== 1 errors in context 1 of 2:
==9912== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9912==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9912==    by 0x488CD0: stringsubst (subst.c:301)
==9912==    by 0x48801B: prefork (subst.c:77)
==9912==    by 0x42B318: execcmd (exec.c:2619)
==9912==    by 0x428CA0: execpline2 (exec.c:1697)
==9912==    by 0x427FD2: execpline (exec.c:1484)
==9912==    by 0x427756: execlist (exec.c:1267)
==9912==    by 0x42717C: execode (exec.c:1073)
==9912==    by 0x431299: runshfunc (exec.c:5040)
==9912==    by 0x430E76: doshfunc (exec.c:4920)
==9912==    by 0x4302FB: execshfunc (exec.c:4557)
==9912==    by 0x42D8C1: execcmd (exec.c:3373)
==9912== 
==9912== 
==9912== 2 errors in context 2 of 2:
==9912== Conditional jump or move depends on uninitialised value(s)
==9912==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9912==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9912==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9912==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9912==    by 0x42D8E9: execcmd (exec.c:3378)
==9912==    by 0x428CA0: execpline2 (exec.c:1697)
==9912==    by 0x427FD2: execpline (exec.c:1484)
==9912==    by 0x42779A: execlist (exec.c:1275)
==9912==    by 0x42717C: execode (exec.c:1073)
==9912==    by 0x431299: runshfunc (exec.c:5040)
==9912==    by 0x430E76: doshfunc (exec.c:4920)
==9912==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9912== 
==9912== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9907-- Caught __NR_exit; running __libc_freeres()
==9965== Checked 4,775,984 bytes
==9965== 
==9964== Checked 4,766,936 bytes
==9964== 
--9907-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9965== LEAK SUMMARY:
==9965==    definitely lost: 2,189 bytes in 12 blocks
==9965==    indirectly lost: 6,756 bytes in 7 blocks
==9965==      possibly lost: 0 bytes in 0 blocks
==9965==    still reachable: 3,108,497 bytes in 69,094 blocks
==9965==         suppressed: 0 bytes in 0 blocks
==9965== Rerun with --leak-check=full to see details of leaked memory
==9965== 
==9965== Use --track-origins=yes to see where uninitialised values come from
==9965== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9965== 
==9965== 1 errors in context 1 of 2:
==9965== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9965==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9965==    by 0x488CD0: stringsubst (subst.c:301)
==9965==    by 0x48801B: prefork (subst.c:77)
==9965==    by 0x42B318: execcmd (exec.c:2619)
==9965==    by 0x428CA0: execpline2 (exec.c:1697)
==9965==    by 0x427FD2: execpline (exec.c:1484)
==9965==    by 0x427756: execlist (exec.c:1267)
==9965==    by 0x42717C: execode (exec.c:1073)
==9965==    by 0x431299: runshfunc (exec.c:5040)
==9965==    by 0x430E76: doshfunc (exec.c:4920)
==9965==    by 0x4302FB: execshfunc (exec.c:4557)
==9965==    by 0x42D8C1: execcmd (exec.c:3373)
==9965== 
==9965== 
==9965== 2 errors in context 2 of 2:
==9965== Conditional jump or move depends on uninitialised value(s)
==9965==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9965==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9965==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9965==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9965==    by 0x42D8E9: execcmd (exec.c:3378)
==9965==    by 0x428CA0: execpline2 (exec.c:1697)
==9965==    by 0x427FD2: execpline (exec.c:1484)
==9965==    by 0x42779A: execlist (exec.c:1275)
==9965==    by 0x42717C: execode (exec.c:1073)
==9965==    by 0x431299: runshfunc (exec.c:5040)
==9965==    by 0x430E76: doshfunc (exec.c:4920)
==9965==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9965== 
==9965== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9964== LEAK SUMMARY:
==9964==    definitely lost: 2,189 bytes in 12 blocks
==9964==    indirectly lost: 6,756 bytes in 7 blocks
==9964==      possibly lost: 0 bytes in 0 blocks
==9964==    still reachable: 3,104,056 bytes in 68,948 blocks
==9964==         suppressed: 0 bytes in 0 blocks
==9964== Rerun with --leak-check=full to see details of leaked memory
==9964== 
==9964== Use --track-origins=yes to see where uninitialised values come from
==9964== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9964== 
==9964== 1 errors in context 1 of 2:
==9964== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9964==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9964==    by 0x488CD0: stringsubst (subst.c:301)
==9964==    by 0x48801B: prefork (subst.c:77)
==9964==    by 0x42B318: execcmd (exec.c:2619)
==9964==    by 0x428CA0: execpline2 (exec.c:1697)
==9964==    by 0x427FD2: execpline (exec.c:1484)
==9964==    by 0x427756: execlist (exec.c:1267)
==9964==    by 0x42717C: execode (exec.c:1073)
==9964==    by 0x431299: runshfunc (exec.c:5040)
==9964==    by 0x430E76: doshfunc (exec.c:4920)
==9964==    by 0x4302FB: execshfunc (exec.c:4557)
==9964==    by 0x42D8C1: execcmd (exec.c:3373)
==9964== 
==9964== 
==9964== 2 errors in context 2 of 2:
==9964== Conditional jump or move depends on uninitialised value(s)
==9964==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9964==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9964==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9964==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9964==    by 0x42D8E9: execcmd (exec.c:3378)
==9964==    by 0x428CA0: execpline2 (exec.c:1697)
==9964==    by 0x427FD2: execpline (exec.c:1484)
==9964==    by 0x42779A: execlist (exec.c:1275)
==9964==    by 0x42717C: execode (exec.c:1073)
==9964==    by 0x431299: runshfunc (exec.c:5040)
==9964==    by 0x430E76: doshfunc (exec.c:4920)
==9964==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9964== 
==9964== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9963-by-pythonnut-on-???
==9963== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9963-by-pythonnut-on-???
==9963== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9963-by-pythonnut-on-???
==9963== 
==9963== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9963== don't want to do, unless you know exactly what you're doing,
==9963== or are doing some strange experiment):
==9963==   /usr/lib/valgrind/../../bin/vgdb --pid=9963 ...command...
==9963== 
==9963== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9963==   /path/to/gdb ./zsh
==9963== and then give GDB the following command
==9963==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9963
==9963== --pid is optional if only one valgrind process is running
==9963== 
==9907== 
==9907== HEAP SUMMARY:
==9907==     in use at exit: 3,113,546 bytes in 68,947 blocks
==9907==   total heap usage: 1,592,179 allocs, 1,523,232 frees, 128,597,350 bytes allocated
==9907== 
==9967== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9967-by-pythonnut-on-???
==9967== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9967-by-pythonnut-on-???
==9967== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9967-by-pythonnut-on-???
==9967== 
==9967== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9967== don't want to do, unless you know exactly what you're doing,
==9967== or are doing some strange experiment):
==9967==   /usr/lib/valgrind/../../bin/vgdb --pid=9967 ...command...
==9967== 
==9967== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9967==   /path/to/gdb ./zsh
==9967== and then give GDB the following command
==9967==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9967
==9967== --pid is optional if only one valgrind process is running
==9967== 
==9966== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9966-by-pythonnut-on-???
==9966== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9966-by-pythonnut-on-???
==9966== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9966-by-pythonnut-on-???
==9966== 
==9966== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9966== don't want to do, unless you know exactly what you're doing,
==9966== or are doing some strange experiment):
==9966==   /usr/lib/valgrind/../../bin/vgdb --pid=9966 ...command...
==9966== 
==9966== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9966==   /path/to/gdb ./zsh
==9966== and then give GDB the following command
==9966==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9966
==9966== --pid is optional if only one valgrind process is running
==9966== 
==9968== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9968-by-pythonnut-on-???
==9968== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9968-by-pythonnut-on-???
==9968== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9968-by-pythonnut-on-???
==9968== 
==9968== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9968== don't want to do, unless you know exactly what you're doing,
==9968== or are doing some strange experiment):
==9968==   /usr/lib/valgrind/../../bin/vgdb --pid=9968 ...command...
==9968== 
==9968== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9968==   /path/to/gdb ./zsh
==9968== and then give GDB the following command
==9968==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9968
==9968== --pid is optional if only one valgrind process is running
==9968== 
==9907== Searching for pointers to 68,947 not-freed blocks
--9907--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9907--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9907--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9907--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9907--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9907--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9907--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9907--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9907--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9907--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9907--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9907--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9907--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9907--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9907--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9907--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9907--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9907--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9907--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9907--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9907--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9907--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9907--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9907--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9966-- Caught __NR_exit; running __libc_freeres()
--9907--   Scanning root segment: 0x701a000..0x701afff (4096)
--9907--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9907--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9907--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9907--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9907--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9907--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9907--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9907--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9907--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9907--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFECD7C,  len 4
==9970== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9970-by-pythonnut-on-???
==9970== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9970-by-pythonnut-on-???
==9970== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9970-by-pythonnut-on-???
==9970== 
==9970== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9970== don't want to do, unless you know exactly what you're doing,
==9970== or are doing some strange experiment):
==9970==   /usr/lib/valgrind/../../bin/vgdb --pid=9970 ...command...
==9970== 
==9970== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9970==   /path/to/gdb ./zsh
==9970== and then give GDB the following command
==9970==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9970
==9970== --pid is optional if only one valgrind process is running
==9970== 
--9966-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9966== 
==9969== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9969-by-pythonnut-on-???
==9969== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9969-by-pythonnut-on-???
==9969== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9969-by-pythonnut-on-???
==9969== 
==9969== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9969== don't want to do, unless you know exactly what you're doing,
==9969== or are doing some strange experiment):
==9969==   /usr/lib/valgrind/../../bin/vgdb --pid=9969 ...command...
==9969== 
==9969== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9969==   /path/to/gdb ./zsh
==9969== and then give GDB the following command
==9969==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9969
==9969== --pid is optional if only one valgrind process is running
==9969== 
--9969-- Caught __NR_exit; running __libc_freeres()
==9966== HEAP SUMMARY:
==9966==     in use at exit: 3,113,175 bytes in 68,972 blocks
==9966==   total heap usage: 1,592,246 allocs, 1,523,274 frees, 128,498,996 bytes allocated
==9966== 
--9969-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9966== Searching for pointers to 68,972 not-freed blocks
--9966--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9966--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9966--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9966--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9966--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9966--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9966--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9966--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9966--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9966--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9966--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9966--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9966--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9966--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9966--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9966--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9966--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9966--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9966--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9966--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9966--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9966--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9966--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9966--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9966--   Scanning root segment: 0x701a000..0x701afff (4096)
--9966--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9966--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9966--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9966--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9966--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9966--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9966--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9966--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9966--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9966--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9969== 
==9969== HEAP SUMMARY:
==9969==     in use at exit: 3,120,378 bytes in 69,179 blocks
==9969==   total heap usage: 1,592,290 allocs, 1,523,111 frees, 128,599,239 bytes allocated
==9969== 
==9907== Checked 4,772,392 bytes
==9907== 
==9969== Searching for pointers to 69,179 not-freed blocks
--9969--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9969--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9969--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9969--   Scanning root segment: 0x4037000..0x403afff (16384)
--9969--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9969--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9969--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9969--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9969--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9969--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9969--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9969--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9969--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9969--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9969--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9969--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9969--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9969--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9969--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9969--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9969--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9969--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9969--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9969--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9969--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9969--   Scanning root segment: 0x701a000..0x701afff (4096)
--9969--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9969--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9969--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9969--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9969--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9969--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9969--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9969--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9969--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9969--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9907== LEAK SUMMARY:
==9907==    definitely lost: 2,189 bytes in 12 blocks
==9907==    indirectly lost: 6,756 bytes in 7 blocks
==9907==      possibly lost: 0 bytes in 0 blocks
==9907==    still reachable: 3,104,601 bytes in 68,928 blocks
==9907==         suppressed: 0 bytes in 0 blocks
==9907== Rerun with --leak-check=full to see details of leaked memory
==9907== 
==9907== Use --track-origins=yes to see where uninitialised values come from
==9907== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9907== 
==9907== 1 errors in context 1 of 2:
==9907== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9907==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9907==    by 0x488CD0: stringsubst (subst.c:301)
==9907==    by 0x48801B: prefork (subst.c:77)
==9907==    by 0x42B318: execcmd (exec.c:2619)
==9907==    by 0x428CA0: execpline2 (exec.c:1697)
==9907==    by 0x427FD2: execpline (exec.c:1484)
==9907==    by 0x427756: execlist (exec.c:1267)
==9907==    by 0x42717C: execode (exec.c:1073)
==9907==    by 0x431299: runshfunc (exec.c:5040)
==9907==    by 0x430E76: doshfunc (exec.c:4920)
==9907==    by 0x4302FB: execshfunc (exec.c:4557)
==9907==    by 0x42D8C1: execcmd (exec.c:3373)
==9907== 
==9907== 
==9907== 2 errors in context 2 of 2:
==9907== Conditional jump or move depends on uninitialised value(s)
==9907==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9907==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9907==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9907==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9907==    by 0x42D8E9: execcmd (exec.c:3378)
==9907==    by 0x428CA0: execpline2 (exec.c:1697)
==9907==    by 0x427FD2: execpline (exec.c:1484)
==9907==    by 0x42779A: execlist (exec.c:1275)
==9907==    by 0x42717C: execode (exec.c:1073)
==9907==    by 0x431299: runshfunc (exec.c:5040)
==9907==    by 0x430E76: doshfunc (exec.c:4920)
==9907==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9907== 
==9907== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9974-- Caught __NR_exit; running __libc_freeres()
==9974== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9974-by-pythonnut-on-???
==9974== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9974-by-pythonnut-on-???
==9974== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9974-by-pythonnut-on-???
==9974== 
==9974== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9974== don't want to do, unless you know exactly what you're doing,
==9974== or are doing some strange experiment):
==9974==   /usr/lib/valgrind/../../bin/vgdb --pid=9974 ...command...
==9974== 
==9974== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9974==   /path/to/gdb ./zsh
==9974== and then give GDB the following command
==9974==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9974
==9974== --pid is optional if only one valgrind process is running
==9974== 
==9966== Checked 4,767,040 bytes
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
==9966== 
--9974-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9974== 
==9966== LEAK SUMMARY:
==9966==    definitely lost: 2,189 bytes in 12 blocks
==9966==    indirectly lost: 6,756 bytes in 7 blocks
==9966==      possibly lost: 0 bytes in 0 blocks
==9966==    still reachable: 3,104,230 bytes in 68,953 blocks
==9966==         suppressed: 0 bytes in 0 blocks
==9966== Rerun with --leak-check=full to see details of leaked memory
==9966== 
==9966== Use --track-origins=yes to see where uninitialised values come from
==9966== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9966== 
==9966== 1 errors in context 1 of 2:
==9966== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9966==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9966==    by 0x488CD0: stringsubst (subst.c:301)
==9966==    by 0x48801B: prefork (subst.c:77)
==9966==    by 0x42B318: execcmd (exec.c:2619)
==9966==    by 0x428CA0: execpline2 (exec.c:1697)
==9966==    by 0x427FD2: execpline (exec.c:1484)
==9966==    by 0x427756: execlist (exec.c:1267)
==9966==    by 0x42717C: execode (exec.c:1073)
==9966==    by 0x431299: runshfunc (exec.c:5040)
==9966==    by 0x430E76: doshfunc (exec.c:4920)
==9966==    by 0x4302FB: execshfunc (exec.c:4557)
==9966==    by 0x42D8C1: execcmd (exec.c:3373)
==9966== 
==9966== 
==9966== 2 errors in context 2 of 2:
==9966== Conditional jump or move depends on uninitialised value(s)
==9966==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9966==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9966==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9966==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9966==    by 0x42D8E9: execcmd (exec.c:3378)
==9966==    by 0x428CA0: execpline2 (exec.c:1697)
==9966==    by 0x427FD2: execpline (exec.c:1484)
==9966==    by 0x42779A: execlist (exec.c:1275)
==9966==    by 0x42717C: execode (exec.c:1073)
==9966==    by 0x431299: runshfunc (exec.c:5040)
==9966==    by 0x430E76: doshfunc (exec.c:4920)
==9966==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9966== 
==9966== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9974== HEAP SUMMARY:
==9974==     in use at exit: 3,115,319 bytes in 69,009 blocks
==9974==   total heap usage: 1,592,246 allocs, 1,523,237 frees, 128,606,023 bytes allocated
==9974== 
==9969== Checked 4,799,448 bytes
==9969== 
--9976-- Caught __NR_exit; running __libc_freeres()
==9974== Searching for pointers to 69,009 not-freed blocks
--9974--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9974--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9976== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9976-by-pythonnut-on-???
--9974--   Scanning root segment: 0x4022000..0x4026fff (20480)
==9976== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9976-by-pythonnut-on-???
==9976== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9976-by-pythonnut-on-???
==9976== 
==9976== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9976== don't want to do, unless you know exactly what you're doing,
==9976== or are doing some strange experiment):
==9976==   /usr/lib/valgrind/../../bin/vgdb --pid=9976 ...command...
==9976== 
==9976== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9976==   /path/to/gdb ./zsh
==9976== and then give GDB the following command
==9976==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9976
==9976== --pid is optional if only one valgrind process is running
==9976== 
--9974--   Scanning root segment: 0x4037000..0x403afff (16384)
--9974--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9974--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9974--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9974--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9974--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9974--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9974--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9974--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9974--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9974--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9974--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9974--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9974--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9974--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9974--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9974--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9974--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==9969== LEAK SUMMARY:
==9969==    definitely lost: 2,189 bytes in 12 blocks
==9969==    indirectly lost: 6,756 bytes in 7 blocks
==9969==      possibly lost: 0 bytes in 0 blocks
==9969==    still reachable: 3,111,433 bytes in 69,160 blocks
==9969==         suppressed: 0 bytes in 0 blocks
==9969== Rerun with --leak-check=full to see details of leaked memory
==9969== 
==9969== Use --track-origins=yes to see where uninitialised values come from
==9969== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9969== 
==9969== 1 errors in context 1 of 2:
==9969== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9969==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9969==    by 0x488CD0: stringsubst (subst.c:301)
==9969==    by 0x48801B: prefork (subst.c:77)
==9969==    by 0x42B318: execcmd (exec.c:2619)
==9969==    by 0x428CA0: execpline2 (exec.c:1697)
==9969==    by 0x427FD2: execpline (exec.c:1484)
==9969==    by 0x427756: execlist (exec.c:1267)
==9969==    by 0x42717C: execode (exec.c:1073)
==9969==    by 0x431299: runshfunc (exec.c:5040)
==9969==    by 0x430E76: doshfunc (exec.c:4920)
==9969==    by 0x4302FB: execshfunc (exec.c:4557)
==9969==    by 0x42D8C1: execcmd (exec.c:3373)
==9969== 
==9969== 
==9969== 2 errors in context 2 of 2:
--9974--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==9969== Conditional jump or move depends on uninitialised value(s)
==9969==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9969==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9969==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9969==    by 0x40EFC2: execbuiltin (builtin.c:450)
--9974--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9969==    by 0x42D8E9: execcmd (exec.c:3378)
==9969==    by 0x428CA0: execpline2 (exec.c:1697)
==9969==    by 0x427FD2: execpline (exec.c:1484)
==9969==    by 0x42779A: execlist (exec.c:1275)
--9974--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==9969==    by 0x42717C: execode (exec.c:1073)
==9969==    by 0x431299: runshfunc (exec.c:5040)
==9969==    by 0x430E76: doshfunc (exec.c:4920)
==9969==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9969== 
==9969== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9974--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9974--   Scanning root segment: 0x701a000..0x701afff (4096)
--9974--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9974--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9974--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9974--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9974--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9974--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9974--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9974--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9974--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9974--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9976-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9976== 
==9977== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9977-by-pythonnut-on-???
==9977== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9977-by-pythonnut-on-???
==9977== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9977-by-pythonnut-on-???
==9977== 
==9977== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9977== don't want to do, unless you know exactly what you're doing,
==9977== or are doing some strange experiment):
==9977==   /usr/lib/valgrind/../../bin/vgdb --pid=9977 ...command...
==9977== 
==9977== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9977==   /path/to/gdb ./zsh
==9977== and then give GDB the following command
==9977==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9977
==9977== --pid is optional if only one valgrind process is running
==9977== 
==9976== HEAP SUMMARY:
==9976==     in use at exit: 3,113,111 bytes in 68,972 blocks
==9976==   total heap usage: 1,592,226 allocs, 1,523,254 frees, 128,496,766 bytes allocated
==9976== 
==9978== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9978-by-pythonnut-on-???
==9978== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9978-by-pythonnut-on-???
==9978== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9978-by-pythonnut-on-???
==9978== 
==9978== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9978== don't want to do, unless you know exactly what you're doing,
==9978== or are doing some strange experiment):
==9978==   /usr/lib/valgrind/../../bin/vgdb --pid=9978 ...command...
==9978== 
==9978== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9978==   /path/to/gdb ./zsh
==9978== and then give GDB the following command
==9978==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9978
==9978== --pid is optional if only one valgrind process is running
==9978== 
==9976== Searching for pointers to 68,972 not-freed blocks
--9976--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9976--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9976--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9976--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9978-- Caught __NR_exit; running __libc_freeres()
--9976--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9976--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9976--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9976--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9976--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9976--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9976--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9976--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9976--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9976--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9976--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9976--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9976--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9976--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9976--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9976--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9976--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9976--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9976--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9976--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9976--   Scanning root segment: 0x701a000..0x701afff (4096)
--9976--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9976--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9976--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9976--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9976--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9976--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9976--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9976--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9976--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9976--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9978-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9978== 
==9978== HEAP SUMMARY:
==9978==     in use at exit: 3,193,757 bytes in 69,186 blocks
==9978==   total heap usage: 1,592,298 allocs, 1,523,112 frees, 128,675,770 bytes allocated
==9978== 
==9974== Checked 4,791,040 bytes
==9974== 
==9978== Searching for pointers to 69,186 not-freed blocks
--9978--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9978--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9978--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9978--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9978--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9978--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9978--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9978--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9978--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9978--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9978--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9978--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9978--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9978--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9978--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9978--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9978--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9978--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9978--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9978--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9978--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9978--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9978--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9978--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9978--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9978--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9978--   Scanning root segment: 0x701a000..0x701afff (4096)
--9978--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9978--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9978--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9978--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9978--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9978--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9978--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9978--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9978--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9978--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9974== LEAK SUMMARY:
==9974==    definitely lost: 2,189 bytes in 12 blocks
==9974==    indirectly lost: 6,756 bytes in 7 blocks
==9974==      possibly lost: 0 bytes in 0 blocks
==9974==    still reachable: 3,106,374 bytes in 68,990 blocks
==9974==         suppressed: 0 bytes in 0 blocks
==9974== Rerun with --leak-check=full to see details of leaked memory
==9974== 
==9974== Use --track-origins=yes to see where uninitialised values come from
==9974== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9974== 
==9974== 1 errors in context 1 of 2:
==9974== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9974==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9974==    by 0x488CD0: stringsubst (subst.c:301)
==9974==    by 0x48801B: prefork (subst.c:77)
==9974==    by 0x42B318: execcmd (exec.c:2619)
==9974==    by 0x428CA0: execpline2 (exec.c:1697)
==9974==    by 0x427FD2: execpline (exec.c:1484)
==9974==    by 0x427756: execlist (exec.c:1267)
==9974==    by 0x42717C: execode (exec.c:1073)
==9974==    by 0x431299: runshfunc (exec.c:5040)
==9974==    by 0x430E76: doshfunc (exec.c:4920)
==9974==    by 0x4302FB: execshfunc (exec.c:4557)
==9974==    by 0x42D8C1: execcmd (exec.c:3373)
==9974== 
==9974== 
==9974== 2 errors in context 2 of 2:
==9974== Conditional jump or move depends on uninitialised value(s)
==9974==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9974==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9974==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9974==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9974==    by 0x42D8E9: execcmd (exec.c:3378)
==9974==    by 0x428CA0: execpline2 (exec.c:1697)
==9974==    by 0x427FD2: execpline (exec.c:1484)
==9974==    by 0x42779A: execlist (exec.c:1275)
==9974==    by 0x42717C: execode (exec.c:1073)
==9974==    by 0x431299: runshfunc (exec.c:5040)
==9974==    by 0x430E76: doshfunc (exec.c:4920)
==9974==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9974== 
==9974== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9973-- Caught __NR_exit; running __libc_freeres()
==9973== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9973-by-pythonnut-on-???
==9973== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9973-by-pythonnut-on-???
==9973== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9973-by-pythonnut-on-???
==9973== 
==9973== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9973== don't want to do, unless you know exactly what you're doing,
==9973== or are doing some strange experiment):
==9973==   /usr/lib/valgrind/../../bin/vgdb --pid=9973 ...command...
==9973== 
==9973== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9973==   /path/to/gdb ./zsh
==9973== and then give GDB the following command
==9973==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9973
==9973== --pid is optional if only one valgrind process is running
==9973== 
==9976== Checked 4,766,968 bytes
==9976== 
--9973-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9976== LEAK SUMMARY:
==9976==    definitely lost: 2,189 bytes in 12 blocks
==9976==    indirectly lost: 6,756 bytes in 7 blocks
==9976==      possibly lost: 0 bytes in 0 blocks
==9976==    still reachable: 3,104,166 bytes in 68,953 blocks
==9976==         suppressed: 0 bytes in 0 blocks
==9976== Rerun with --leak-check=full to see details of leaked memory
==9976== 
==9976== Use --track-origins=yes to see where uninitialised values come from
==9976== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9976== 
==9976== 1 errors in context 1 of 2:
==9976== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9976==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9976==    by 0x488CD0: stringsubst (subst.c:301)
==9976==    by 0x48801B: prefork (subst.c:77)
==9976==    by 0x42B318: execcmd (exec.c:2619)
==9976==    by 0x428CA0: execpline2 (exec.c:1697)
==9976==    by 0x427FD2: execpline (exec.c:1484)
==9976==    by 0x427756: execlist (exec.c:1267)
==9976==    by 0x42717C: execode (exec.c:1073)
==9976==    by 0x431299: runshfunc (exec.c:5040)
==9976==    by 0x430E76: doshfunc (exec.c:4920)
==9976==    by 0x4302FB: execshfunc (exec.c:4557)
==9976==    by 0x42D8C1: execcmd (exec.c:3373)
==9976== 
==9976== 
==9976== 2 errors in context 2 of 2:
==9976== Conditional jump or move depends on uninitialised value(s)
==9976==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9976==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9976==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9976==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9976==    by 0x42D8E9: execcmd (exec.c:3378)
==9976==    by 0x428CA0: execpline2 (exec.c:1697)
==9976==    by 0x427FD2: execpline (exec.c:1484)
==9976==    by 0x42779A: execlist (exec.c:1275)
==9976==    by 0x42717C: execode (exec.c:1073)
==9976==    by 0x431299: runshfunc (exec.c:5040)
==9976==    by 0x430E76: doshfunc (exec.c:4920)
==9976==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9976== 
==9976== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9973== 
==9973== HEAP SUMMARY:
==9973==     in use at exit: 3,115,255 bytes in 69,006 blocks
==9973==   total heap usage: 1,592,248 allocs, 1,523,242 frees, 128,606,567 bytes allocated
==9973== 
==9973== Searching for pointers to 69,006 not-freed blocks
--9973--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9973--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9973--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9973--   Scanning root segment: 0x4037000..0x403afff (16384)
--9973--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9973--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9973--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9973--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9973--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9973--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9973--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9973--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9973--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9973--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9973--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9973--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9973--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9973--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9973--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9973--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9973--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9973--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9973--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9973--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9973--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9973--   Scanning root segment: 0x701a000..0x701afff (4096)
--9973--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9973--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9973--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9973--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9973--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9973--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9973--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9973--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9973--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9973--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9979== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9979-by-pythonnut-on-???
==9979== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9979-by-pythonnut-on-???
==9979== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9979-by-pythonnut-on-???
==9979== 
==9979== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9979== don't want to do, unless you know exactly what you're doing,
==9979== or are doing some strange experiment):
==9979==   /usr/lib/valgrind/../../bin/vgdb --pid=9979 ...command...
==9979== 
==9979== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9979==   /path/to/gdb ./zsh
==9979== and then give GDB the following command
==9979==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9979
==9979== --pid is optional if only one valgrind process is running
==9979== 
==9978== Checked 4,984,352 bytes
==9978== 
--9979-- Caught __NR_exit; running __libc_freeres()
==9978== LEAK SUMMARY:
==9978==    definitely lost: 2,189 bytes in 12 blocks
==9978==    indirectly lost: 6,756 bytes in 7 blocks
==9978==      possibly lost: 0 bytes in 0 blocks
==9978==    still reachable: 3,184,812 bytes in 69,167 blocks
==9978==         suppressed: 0 bytes in 0 blocks
==9978== Rerun with --leak-check=full to see details of leaked memory
==9978== 
==9978== Use --track-origins=yes to see where uninitialised values come from
==9978== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9978== 
==9978== 1 errors in context 1 of 2:
==9978== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9978==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9978==    by 0x488CD0: stringsubst (subst.c:301)
==9978==    by 0x48801B: prefork (subst.c:77)
==9978==    by 0x42B318: execcmd (exec.c:2619)
==9978==    by 0x428CA0: execpline2 (exec.c:1697)
==9978==    by 0x427FD2: execpline (exec.c:1484)
==9978==    by 0x427756: execlist (exec.c:1267)
==9978==    by 0x42717C: execode (exec.c:1073)
==9978==    by 0x431299: runshfunc (exec.c:5040)
==9978==    by 0x430E76: doshfunc (exec.c:4920)
==9978==    by 0x4302FB: execshfunc (exec.c:4557)
==9978==    by 0x42D8C1: execcmd (exec.c:3373)
==9978== 
==9978== 
==9978== 2 errors in context 2 of 2:
==9978== Conditional jump or move depends on uninitialised value(s)
==9978==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9978==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9978==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9978==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9978==    by 0x42D8E9: execcmd (exec.c:3378)
==9978==    by 0x428CA0: execpline2 (exec.c:1697)
==9978==    by 0x427FD2: execpline (exec.c:1484)
==9978==    by 0x42779A: execlist (exec.c:1275)
==9978==    by 0x42717C: execode (exec.c:1073)
==9978==    by 0x431299: runshfunc (exec.c:5040)
==9978==    by 0x430E76: doshfunc (exec.c:4920)
==9978==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9978== 
==9978== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9979-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9979== 
==9979== HEAP SUMMARY:
==9979==     in use at exit: 3,113,140 bytes in 68,973 blocks
==9979==   total heap usage: 1,592,239 allocs, 1,523,266 frees, 128,499,454 bytes allocated
==9979== 
==9979== Searching for pointers to 68,973 not-freed blocks
--9979--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9979--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9979--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9979--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9979--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9979--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9979--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9979--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9979--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9979--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9979--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9979--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9979--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9979--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9979--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9979--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9979--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9979--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9979--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9979--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9979--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9979--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9979--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9979--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9979--   Scanning root segment: 0x701a000..0x701afff (4096)
--9979--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9979--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9979--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9979--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9979--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9979--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9979--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9979--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9979--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9979--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9973== Checked 4,790,352 bytes
==9973== 
==9973== LEAK SUMMARY:
==9973==    definitely lost: 2,189 bytes in 12 blocks
==9973==    indirectly lost: 6,756 bytes in 7 blocks
==9973==      possibly lost: 0 bytes in 0 blocks
==9973==    still reachable: 3,106,310 bytes in 68,987 blocks
==9973==         suppressed: 0 bytes in 0 blocks
==9973== Rerun with --leak-check=full to see details of leaked memory
==9973== 
==9973== Use --track-origins=yes to see where uninitialised values come from
==9973== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9973== 
==9973== 1 errors in context 1 of 2:
==9973== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9973==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9973==    by 0x488CD0: stringsubst (subst.c:301)
==9973==    by 0x48801B: prefork (subst.c:77)
==9973==    by 0x42B318: execcmd (exec.c:2619)
==9973==    by 0x428CA0: execpline2 (exec.c:1697)
==9973==    by 0x427FD2: execpline (exec.c:1484)
==9973==    by 0x427756: execlist (exec.c:1267)
==9973==    by 0x42717C: execode (exec.c:1073)
==9973==    by 0x431299: runshfunc (exec.c:5040)
==9973==    by 0x430E76: doshfunc (exec.c:4920)
==9973==    by 0x4302FB: execshfunc (exec.c:4557)
==9973==    by 0x42D8C1: execcmd (exec.c:3373)
==9973== 
==9973== 
==9973== 2 errors in context 2 of 2:
==9973== Conditional jump or move depends on uninitialised value(s)
==9973==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9973==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9973==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9973==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9973==    by 0x42D8E9: execcmd (exec.c:3378)
==9973==    by 0x428CA0: execpline2 (exec.c:1697)
==9973==    by 0x427FD2: execpline (exec.c:1484)
==9973==    by 0x42779A: execlist (exec.c:1275)
==9973==    by 0x42717C: execode (exec.c:1073)
==9973==    by 0x431299: runshfunc (exec.c:5040)
==9973==    by 0x430E76: doshfunc (exec.c:4920)
==9973==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9973== 
==9973== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9980-by-pythonnut-on-???
==9980== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9980-by-pythonnut-on-???
==9980== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9980-by-pythonnut-on-???
==9980== 
==9980== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9980== don't want to do, unless you know exactly what you're doing,
==9980== or are doing some strange experiment):
==9980==   /usr/lib/valgrind/../../bin/vgdb --pid=9980 ...command...
==9980== 
==9980== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9980==   /path/to/gdb ./zsh
==9980== and then give GDB the following command
==9980==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9980
==9980== --pid is optional if only one valgrind process is running
==9980== 
--9980-- Caught __NR_exit; running __libc_freeres()
--9980-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9980== 
==9980== HEAP SUMMARY:
==9980==     in use at exit: 3,115,259 bytes in 69,006 blocks
==9980==   total heap usage: 1,592,264 allocs, 1,523,258 frees, 128,611,563 bytes allocated
==9980== 
==9979== Checked 4,766,480 bytes
==9979== 
==9979== LEAK SUMMARY:
==9979==    definitely lost: 2,189 bytes in 12 blocks
==9979==    indirectly lost: 6,756 bytes in 7 blocks
==9979==      possibly lost: 0 bytes in 0 blocks
==9979==    still reachable: 3,104,195 bytes in 68,954 blocks
==9979==         suppressed: 0 bytes in 0 blocks
==9979== Rerun with --leak-check=full to see details of leaked memory
==9979== 
==9979== Use --track-origins=yes to see where uninitialised values come from
==9979== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9979== 
==9979== 1 errors in context 1 of 2:
==9979== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9979==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9979==    by 0x488CD0: stringsubst (subst.c:301)
==9979==    by 0x48801B: prefork (subst.c:77)
==9979==    by 0x42B318: execcmd (exec.c:2619)
==9979==    by 0x428CA0: execpline2 (exec.c:1697)
==9979==    by 0x427FD2: execpline (exec.c:1484)
==9979==    by 0x427756: execlist (exec.c:1267)
==9979==    by 0x42717C: execode (exec.c:1073)
==9979==    by 0x431299: runshfunc (exec.c:5040)
==9979==    by 0x430E76: doshfunc (exec.c:4920)
==9979==    by 0x4302FB: execshfunc (exec.c:4557)
==9979==    by 0x42D8C1: execcmd (exec.c:3373)
==9979== 
==9979== 
==9979== 2 errors in context 2 of 2:
==9979== Conditional jump or move depends on uninitialised value(s)
==9979==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9979==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9979==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9979==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9979==    by 0x42D8E9: execcmd (exec.c:3378)
==9979==    by 0x428CA0: execpline2 (exec.c:1697)
==9979==    by 0x427FD2: execpline (exec.c:1484)
==9979==    by 0x42779A: execlist (exec.c:1275)
==9979==    by 0x42717C: execode (exec.c:1073)
==9979==    by 0x431299: runshfunc (exec.c:5040)
==9979==    by 0x430E76: doshfunc (exec.c:4920)
==9979==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9979== 
==9979== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== Searching for pointers to 69,006 not-freed blocks
--9980--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9980--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9980--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9980--   Scanning root segment: 0x4037000..0x403afff (16384)
--9980--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9980--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9980--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9980--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9980--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9980--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9980--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9980--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9980--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9980--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9980--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9980--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9980--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9980--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9980--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9980--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9980--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9980--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9980--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9980--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9980--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9980--   Scanning root segment: 0x701a000..0x701afff (4096)
--9980--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9980--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9980--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9980--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9980--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9980--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9980--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9980--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9980--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9980--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9981== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9981-by-pythonnut-on-???
==9981== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9981-by-pythonnut-on-???
==9981== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9981-by-pythonnut-on-???
==9981== 
==9981== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9981== don't want to do, unless you know exactly what you're doing,
==9981== or are doing some strange experiment):
==9981==   /usr/lib/valgrind/../../bin/vgdb --pid=9981 ...command...
==9981== 
==9981== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9981==   /path/to/gdb ./zsh
==9981== and then give GDB the following command
==9981==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9981
==9981== --pid is optional if only one valgrind process is running
==9981== 
--9981-- Caught __NR_exit; running __libc_freeres()
--9981-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9981== 
==9981== HEAP SUMMARY:
==9981==     in use at exit: 3,111,651 bytes in 68,913 blocks
==9981==   total heap usage: 1,592,209 allocs, 1,523,296 frees, 128,502,445 bytes allocated
==9981== 
==9980== Checked 4,790,360 bytes
==9980== 
==9981== Searching for pointers to 68,913 not-freed blocks
--9981--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9981--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9981--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9981--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9981--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9981--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9981--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9981--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9981--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9981--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9981--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9981--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9981--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9981--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9981--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9981--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9981--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9981--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9981--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9981--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9981--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9981--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9981--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9981--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9981--   Scanning root segment: 0x701a000..0x701afff (4096)
--9981--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9981--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9981--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9981--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9981--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9981--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9981--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9981--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9981--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9981--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9980== LEAK SUMMARY:
==9980==    definitely lost: 2,189 bytes in 12 blocks
==9980==    indirectly lost: 6,756 bytes in 7 blocks
==9980==      possibly lost: 0 bytes in 0 blocks
==9980==    still reachable: 3,106,314 bytes in 68,987 blocks
==9980==         suppressed: 0 bytes in 0 blocks
==9980== Rerun with --leak-check=full to see details of leaked memory
==9980== 
==9980== Use --track-origins=yes to see where uninitialised values come from
==9980== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== 
==9980== 1 errors in context 1 of 2:
==9980== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9980==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9980==    by 0x488CD0: stringsubst (subst.c:301)
==9980==    by 0x48801B: prefork (subst.c:77)
==9980==    by 0x42B318: execcmd (exec.c:2619)
==9980==    by 0x428CA0: execpline2 (exec.c:1697)
==9980==    by 0x427FD2: execpline (exec.c:1484)
==9980==    by 0x427756: execlist (exec.c:1267)
==9980==    by 0x42717C: execode (exec.c:1073)
==9980==    by 0x431299: runshfunc (exec.c:5040)
==9980==    by 0x430E76: doshfunc (exec.c:4920)
==9980==    by 0x4302FB: execshfunc (exec.c:4557)
==9980==    by 0x42D8C1: execcmd (exec.c:3373)
==9980== 
==9980== 
==9980== 2 errors in context 2 of 2:
==9980== Conditional jump or move depends on uninitialised value(s)
==9980==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9980==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9980==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9980==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9980==    by 0x42D8E9: execcmd (exec.c:3378)
==9980==    by 0x428CA0: execpline2 (exec.c:1697)
==9980==    by 0x427FD2: execpline (exec.c:1484)
==9980==    by 0x42779A: execlist (exec.c:1275)
==9980==    by 0x42717C: execode (exec.c:1073)
==9980==    by 0x431299: runshfunc (exec.c:5040)
==9980==    by 0x430E76: doshfunc (exec.c:4920)
==9980==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9980== 
==9980== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9982== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9982-by-pythonnut-on-???
==9982== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9982-by-pythonnut-on-???
==9982== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9982-by-pythonnut-on-???
==9982== 
==9982== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9982== don't want to do, unless you know exactly what you're doing,
==9982== or are doing some strange experiment):
==9982==   /usr/lib/valgrind/../../bin/vgdb --pid=9982 ...command...
==9982== 
==9982== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9982==   /path/to/gdb ./zsh
==9982== and then give GDB the following command
==9982==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9982
==9982== --pid is optional if only one valgrind process is running
==9982== 
--9982-- Caught __NR_exit; running __libc_freeres()
--9982-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9982== 
==9982== HEAP SUMMARY:
==9982==     in use at exit: 3,115,258 bytes in 69,006 blocks
==9982==   total heap usage: 1,592,269 allocs, 1,523,263 frees, 128,613,676 bytes allocated
==9982== 
--9977-- Caught __NR_exit; running __libc_freeres()
==9982== Searching for pointers to 69,006 not-freed blocks
--9982--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9982--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9982--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9982--   Scanning root segment: 0x4037000..0x403afff (16384)
--9982--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9982--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9982--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9982--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9982--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9982--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9982--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9982--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9982--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9982--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9982--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9982--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9982--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9982--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9982--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9982--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9982--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9982--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9982--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9982--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9982--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9982--   Scanning root segment: 0x701a000..0x701afff (4096)
--9982--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9982--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9982--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9982--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9982--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9982--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9982--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9982--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9982--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9982--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9981== Checked 4,765,936 bytes
==9981== 
--9977-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9977== 
==9977== HEAP SUMMARY:
==9977==     in use at exit: 3,157,330 bytes in 69,186 blocks
==9977==   total heap usage: 1,596,016 allocs, 1,526,830 frees, 129,903,927 bytes allocated
==9977== 
==9981== LEAK SUMMARY:
==9981==    definitely lost: 2,189 bytes in 12 blocks
==9981==    indirectly lost: 6,756 bytes in 7 blocks
==9981==      possibly lost: 0 bytes in 0 blocks
==9981==    still reachable: 3,102,706 bytes in 68,894 blocks
==9981==         suppressed: 0 bytes in 0 blocks
==9981== Rerun with --leak-check=full to see details of leaked memory
==9981== 
==9981== Use --track-origins=yes to see where uninitialised values come from
==9981== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9981== 
==9981== 1 errors in context 1 of 2:
==9981== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9981==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9981==    by 0x488CD0: stringsubst (subst.c:301)
==9981==    by 0x48801B: prefork (subst.c:77)
==9981==    by 0x42B318: execcmd (exec.c:2619)
==9981==    by 0x428CA0: execpline2 (exec.c:1697)
==9981==    by 0x427FD2: execpline (exec.c:1484)
==9981==    by 0x427756: execlist (exec.c:1267)
==9981==    by 0x42717C: execode (exec.c:1073)
==9981==    by 0x431299: runshfunc (exec.c:5040)
==9981==    by 0x430E76: doshfunc (exec.c:4920)
==9981==    by 0x4302FB: execshfunc (exec.c:4557)
==9981==    by 0x42D8C1: execcmd (exec.c:3373)
==9981== 
==9981== 
==9981== 2 errors in context 2 of 2:
==9981== Conditional jump or move depends on uninitialised value(s)
==9981==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9981==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9981==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9981==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9981==    by 0x42D8E9: execcmd (exec.c:3378)
==9981==    by 0x428CA0: execpline2 (exec.c:1697)
==9981==    by 0x427FD2: execpline (exec.c:1484)
==9981==    by 0x42779A: execlist (exec.c:1275)
==9981==    by 0x42717C: execode (exec.c:1073)
==9981==    by 0x431299: runshfunc (exec.c:5040)
==9981==    by 0x430E76: doshfunc (exec.c:4920)
==9981==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9981== 
==9981== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9977== Searching for pointers to 69,186 not-freed blocks
--9977--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9977--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9977--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9977--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9977--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9977--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9977--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9977--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9977--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9977--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9977--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9977--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9977--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9977--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9977--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9977--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9977--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9977--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9977--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9977--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9977--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9977--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9977--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9977--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9977--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9977--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9977--   Scanning root segment: 0x701a000..0x701afff (4096)
--9977--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9977--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9977--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9977--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9977--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9977--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9977--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9977--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9977--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9977--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9984-- Caught __NR_exit; running __libc_freeres()
==9984== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9984-by-pythonnut-on-???
==9984== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9984-by-pythonnut-on-???
==9984== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9984-by-pythonnut-on-???
==9984== 
==9984== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9984== don't want to do, unless you know exactly what you're doing,
==9984== or are doing some strange experiment):
==9984==   /usr/lib/valgrind/../../bin/vgdb --pid=9984 ...command...
==9984== 
==9984== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9984==   /path/to/gdb ./zsh
==9984== and then give GDB the following command
==9984==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9984
==9984== --pid is optional if only one valgrind process is running
==9984== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9982== Checked 4,790,360 bytes
==9982== 
--9984-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9982== LEAK SUMMARY:
==9982==    definitely lost: 2,189 bytes in 12 blocks
==9982==    indirectly lost: 6,756 bytes in 7 blocks
==9982==      possibly lost: 0 bytes in 0 blocks
==9982==    still reachable: 3,106,313 bytes in 68,987 blocks
==9982==         suppressed: 0 bytes in 0 blocks
==9982== Rerun with --leak-check=full to see details of leaked memory
==9982== 
==9982== Use --track-origins=yes to see where uninitialised values come from
==9982== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9982== 
==9982== 1 errors in context 1 of 2:
==9982== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9982==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9982==    by 0x488CD0: stringsubst (subst.c:301)
==9982==    by 0x48801B: prefork (subst.c:77)
==9982==    by 0x42B318: execcmd (exec.c:2619)
==9982==    by 0x428CA0: execpline2 (exec.c:1697)
==9982==    by 0x427FD2: execpline (exec.c:1484)
==9982==    by 0x427756: execlist (exec.c:1267)
==9982==    by 0x42717C: execode (exec.c:1073)
==9982==    by 0x431299: runshfunc (exec.c:5040)
==9982==    by 0x430E76: doshfunc (exec.c:4920)
==9982==    by 0x4302FB: execshfunc (exec.c:4557)
==9982==    by 0x42D8C1: execcmd (exec.c:3373)
==9982== 
==9982== 
==9982== 2 errors in context 2 of 2:
==9982== Conditional jump or move depends on uninitialised value(s)
==9982==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9982==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9982==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9982==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9982==    by 0x42D8E9: execcmd (exec.c:3378)
==9982==    by 0x428CA0: execpline2 (exec.c:1697)
==9982==    by 0x427FD2: execpline (exec.c:1484)
==9982==    by 0x42779A: execlist (exec.c:1275)
==9982==    by 0x42717C: execode (exec.c:1073)
==9982==    by 0x431299: runshfunc (exec.c:5040)
==9982==    by 0x430E76: doshfunc (exec.c:4920)
==9982==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9982== 
==9982== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9984== 
==9984== HEAP SUMMARY:
==9984==     in use at exit: 3,123,883 bytes in 69,153 blocks
==9984==   total heap usage: 1,592,581 allocs, 1,523,428 frees, 128,531,730 bytes allocated
==9984== 
==9986== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9986-by-pythonnut-on-???
==9986== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9986-by-pythonnut-on-???
==9986== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9986-by-pythonnut-on-???
==9986== 
==9986== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9986== don't want to do, unless you know exactly what you're doing,
==9986== or are doing some strange experiment):
==9986==   /usr/lib/valgrind/../../bin/vgdb --pid=9986 ...command...
==9986== 
==9986== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9986==   /path/to/gdb ./zsh
==9986== and then give GDB the following command
==9986==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9986
==9986== --pid is optional if only one valgrind process is running
==9986== 
--9986-- Caught __NR_exit; running __libc_freeres()
==9977== Checked 4,947,240 bytes
==9977== 
==9984== Searching for pointers to 69,153 not-freed blocks
--9984--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9984--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9984--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9984--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9984--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9984--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9984--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9984--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9984--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9984--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9984--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9984--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9984--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9984--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9984--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9984--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9984--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9984--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9984--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9984--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9984--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9984--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9984--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9984--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9984--   Scanning root segment: 0x701a000..0x701afff (4096)
--9984--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9984--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9984--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9984--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9984--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9984--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9984--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9984--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9984--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9984--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9986-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9986== 
==9986== HEAP SUMMARY:
==9986==     in use at exit: 3,115,257 bytes in 69,006 blocks
==9986==   total heap usage: 1,592,274 allocs, 1,523,268 frees, 128,615,789 bytes allocated
==9986== 
==9977== LEAK SUMMARY:
==9977==    definitely lost: 2,189 bytes in 12 blocks
==9977==    indirectly lost: 6,756 bytes in 7 blocks
==9977==      possibly lost: 0 bytes in 0 blocks
==9977==    still reachable: 3,148,385 bytes in 69,167 blocks
==9977==         suppressed: 0 bytes in 0 blocks
==9977== Rerun with --leak-check=full to see details of leaked memory
==9977== 
==9977== Use --track-origins=yes to see where uninitialised values come from
==9977== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9977== 
==9977== 1 errors in context 1 of 2:
==9977== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9977==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9977==    by 0x488CD0: stringsubst (subst.c:301)
==9977==    by 0x48801B: prefork (subst.c:77)
==9977==    by 0x42B318: execcmd (exec.c:2619)
==9977==    by 0x428CA0: execpline2 (exec.c:1697)
==9977==    by 0x427FD2: execpline (exec.c:1484)
==9977==    by 0x427756: execlist (exec.c:1267)
==9977==    by 0x42717C: execode (exec.c:1073)
==9977==    by 0x431299: runshfunc (exec.c:5040)
==9977==    by 0x430E76: doshfunc (exec.c:4920)
==9977==    by 0x4302FB: execshfunc (exec.c:4557)
==9977==    by 0x42D8C1: execcmd (exec.c:3373)
==9977== 
==9977== 
==9977== 2 errors in context 2 of 2:
==9977== Conditional jump or move depends on uninitialised value(s)
==9977==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9977==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9977==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9977==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9977==    by 0x42D8E9: execcmd (exec.c:3378)
==9977==    by 0x428CA0: execpline2 (exec.c:1697)
==9977==    by 0x427FD2: execpline (exec.c:1484)
==9977==    by 0x42779A: execlist (exec.c:1275)
==9977==    by 0x42717C: execode (exec.c:1073)
==9977==    by 0x431299: runshfunc (exec.c:5040)
==9977==    by 0x430E76: doshfunc (exec.c:4920)
==9977==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9977== 
==9977== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== Searching for pointers to 69,006 not-freed blocks
--9986--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9986--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9986--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9986--   Scanning root segment: 0x4037000..0x403afff (16384)
--9986--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9986--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9986--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9986--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9986--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9986--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9986--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9986--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9986--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9986--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9986--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9986--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9986--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9986--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9986--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9986--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9986--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9986--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9986--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9986--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9986--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9986--   Scanning root segment: 0x701a000..0x701afff (4096)
--9986--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9986--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9986--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9986--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9986--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9986--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9986--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9986--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9986--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9986--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9989-by-pythonnut-on-???
==9989== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9989-by-pythonnut-on-???
==9989== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9989-by-pythonnut-on-???
==9989== 
==9989== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9989== don't want to do, unless you know exactly what you're doing,
==9989== or are doing some strange experiment):
==9989==   /usr/lib/valgrind/../../bin/vgdb --pid=9989 ...command...
==9989== 
==9989== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9989==   /path/to/gdb ./zsh
==9989== and then give GDB the following command
==9989==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9989
==9989== --pid is optional if only one valgrind process is running
==9989== 
--9989-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEDFFC,  len 4
--9990-- Caught __NR_exit; running __libc_freeres()
--9989-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9990== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9990-by-pythonnut-on-???
==9990== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9990-by-pythonnut-on-???
==9990== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9990-by-pythonnut-on-???
==9990== 
==9990== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9990== don't want to do, unless you know exactly what you're doing,
==9990== or are doing some strange experiment):
==9990==   /usr/lib/valgrind/../../bin/vgdb --pid=9990 ...command...
==9990== 
==9990== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9990==   /path/to/gdb ./zsh
==9990== and then give GDB the following command
==9990==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9990
==9990== --pid is optional if only one valgrind process is running
==9990== 
==9989== 
==9989== HEAP SUMMARY:
==9989==     in use at exit: 3,163,544 bytes in 69,186 blocks
==9989==   total heap usage: 1,592,303 allocs, 1,523,117 frees, 128,684,264 bytes allocated
==9989== 
--9990-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9990== 
==9984== Checked 4,785,176 bytes
==9984== 
==9990== HEAP SUMMARY:
==9990==     in use at exit: 3,142,072 bytes in 69,186 blocks
==9990==   total heap usage: 1,592,309 allocs, 1,523,123 frees, 128,686,384 bytes allocated
==9990== 
==9989== Searching for pointers to 69,186 not-freed blocks
--9989--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9989--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9989--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9989--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9989--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9989--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--9989--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9989--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9989--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9989--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9989--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9989--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9989--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9989--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9989--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9989--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9989--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9989--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9989--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9989--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9989--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9989--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9989--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9989--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9989--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9989--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9989--   Scanning root segment: 0x701a000..0x701afff (4096)
--9989--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9989--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9989--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9989--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9989--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9989--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9989--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9989--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9989--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9989--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9984== LEAK SUMMARY:
==9984==    definitely lost: 2,189 bytes in 12 blocks
==9984==    indirectly lost: 6,756 bytes in 7 blocks
==9984==      possibly lost: 0 bytes in 0 blocks
==9984==    still reachable: 3,114,938 bytes in 69,134 blocks
==9984==         suppressed: 0 bytes in 0 blocks
==9984== Rerun with --leak-check=full to see details of leaked memory
==9984== 
==9984== Use --track-origins=yes to see where uninitialised values come from
==9984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9984== 
==9984== 1 errors in context 1 of 2:
==9984== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9984==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9984==    by 0x488CD0: stringsubst (subst.c:301)
==9984==    by 0x48801B: prefork (subst.c:77)
==9984==    by 0x42B318: execcmd (exec.c:2619)
==9984==    by 0x428CA0: execpline2 (exec.c:1697)
==9984==    by 0x427FD2: execpline (exec.c:1484)
==9984==    by 0x427756: execlist (exec.c:1267)
==9984==    by 0x42717C: execode (exec.c:1073)
==9984==    by 0x431299: runshfunc (exec.c:5040)
==9984==    by 0x430E76: doshfunc (exec.c:4920)
==9984==    by 0x4302FB: execshfunc (exec.c:4557)
==9984==    by 0x42D8C1: execcmd (exec.c:3373)
==9984== 
==9984== 
==9984== 2 errors in context 2 of 2:
==9984== Conditional jump or move depends on uninitialised value(s)
==9984==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9984==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9984==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9984==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9984==    by 0x42D8E9: execcmd (exec.c:3378)
==9984==    by 0x428CA0: execpline2 (exec.c:1697)
==9984==    by 0x427FD2: execpline (exec.c:1484)
==9984==    by 0x42779A: execlist (exec.c:1275)
==9984==    by 0x42717C: execode (exec.c:1073)
==9984==    by 0x431299: runshfunc (exec.c:5040)
==9984==    by 0x430E76: doshfunc (exec.c:4920)
==9984==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9984== 
==9984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== Checked 4,790,360 bytes
==9986== 
--9983-- Caught __NR_exit; running __libc_freeres()
==9990== Searching for pointers to 69,186 not-freed blocks
--9990--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9990--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9990--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9990--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9990--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9990--   Scanning root segment: 0x41d6000..0x4204fff (192512)
==9983== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9983-by-pythonnut-on-???
==9983== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9983-by-pythonnut-on-???
==9983== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9983-by-pythonnut-on-???
==9983== 
==9983== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9983== don't want to do, unless you know exactly what you're doing,
==9983== or are doing some strange experiment):
==9983==   /usr/lib/valgrind/../../bin/vgdb --pid=9983 ...command...
==9983== 
==9983== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9983==   /path/to/gdb ./zsh
==9983== and then give GDB the following command
==9983==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9983
==9983== --pid is optional if only one valgrind process is running
==9983== 
--9990--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9990--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9990--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9990--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9990--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9990--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9990--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9990--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9990--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9990--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9990--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9990--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9990--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9990--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9990--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9990--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9990--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9990--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9990--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9990--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9990--   Scanning root segment: 0x701a000..0x701afff (4096)
--9990--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9990--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9990--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9990--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9990--   Scanning root segment: 0xb268000..0xb268fff (4096)
==9986== LEAK SUMMARY:
==9986==    definitely lost: 2,189 bytes in 12 blocks
--9990--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==9986==    indirectly lost: 6,756 bytes in 7 blocks
==9986==      possibly lost: 0 bytes in 0 blocks
==9986==    still reachable: 3,106,312 bytes in 68,987 blocks
==9986==         suppressed: 0 bytes in 0 blocks
==9986== Rerun with --leak-check=full to see details of leaked memory
==9986== 
--9990--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9990--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
==9986== Use --track-origins=yes to see where uninitialised values come from
==9986== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== 
==9986== 1 errors in context 1 of 2:
==9986== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--9990--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
==9986==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9986==    by 0x488CD0: stringsubst (subst.c:301)
==9986==    by 0x48801B: prefork (subst.c:77)
==9986==    by 0x42B318: execcmd (exec.c:2619)
--9990--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9986==    by 0x428CA0: execpline2 (exec.c:1697)
==9986==    by 0x427FD2: execpline (exec.c:1484)
==9986==    by 0x427756: execlist (exec.c:1267)
==9986==    by 0x42717C: execode (exec.c:1073)
==9986==    by 0x431299: runshfunc (exec.c:5040)
==9986==    by 0x430E76: doshfunc (exec.c:4920)
==9986==    by 0x4302FB: execshfunc (exec.c:4557)
==9986==    by 0x42D8C1: execcmd (exec.c:3373)
==9986== 
==9986== 
==9986== 2 errors in context 2 of 2:
==9986== Conditional jump or move depends on uninitialised value(s)
==9986==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9986==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9986==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9986==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9986==    by 0x42D8E9: execcmd (exec.c:3378)
==9986==    by 0x428CA0: execpline2 (exec.c:1697)
==9986==    by 0x427FD2: execpline (exec.c:1484)
==9986==    by 0x42779A: execlist (exec.c:1275)
==9986==    by 0x42717C: execode (exec.c:1073)
==9986==    by 0x431299: runshfunc (exec.c:5040)
==9986==    by 0x430E76: doshfunc (exec.c:4920)
==9986==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9986== 
==9986== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9983-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9992== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9992-by-pythonnut-on-???
==9992== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9992-by-pythonnut-on-???
==9992== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9992-by-pythonnut-on-???
==9992== 
==9992== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9992== don't want to do, unless you know exactly what you're doing,
==9992== or are doing some strange experiment):
==9992==   /usr/lib/valgrind/../../bin/vgdb --pid=9992 ...command...
==9992== 
==9992== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9992==   /path/to/gdb ./zsh
==9992== and then give GDB the following command
==9992==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9992
==9992== --pid is optional if only one valgrind process is running
==9992== 
--9992-- Caught __NR_exit; running __libc_freeres()
==9983== 
==9983== HEAP SUMMARY:
==9983==     in use at exit: 3,123,819 bytes in 69,150 blocks
==9983==   total heap usage: 1,592,579 allocs, 1,523,429 frees, 128,531,489 bytes allocated
==9983== 
--9992-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9992== 
==9992== HEAP SUMMARY:
==9992==     in use at exit: 3,115,256 bytes in 69,006 blocks
==9992==   total heap usage: 1,592,279 allocs, 1,523,273 frees, 128,617,902 bytes allocated
==9992== 
==9983== Searching for pointers to 69,150 not-freed blocks
--9983--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9983--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9983--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9983--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9983--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9983--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9983--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9983--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9983--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9983--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9983--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9983--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9983--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9983--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9983--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9983--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9983--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9983--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9983--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9983--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9983--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9983--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9983--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9983--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9983--   Scanning root segment: 0x701a000..0x701afff (4096)
--9983--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9983--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9983--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9983--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9983--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9983--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9983--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9983--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9983--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9983--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== Checked 5,088,288 bytes
==9989== 
==9992== Searching for pointers to 69,006 not-freed blocks
--9992--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9992--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9992--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9992--   Scanning root segment: 0x4037000..0x403afff (16384)
--9992--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9992--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9992--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9992--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9992--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9992--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9992--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9992--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9992--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9992--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9992--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9992--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9992--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9992--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9992--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9992--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9992--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9992--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9992--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9992--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9992--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9992--   Scanning root segment: 0x701a000..0x701afff (4096)
--9992--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9992--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9992--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9992--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9992--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9992--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9992--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9992--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9992--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9992--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== LEAK SUMMARY:
==9989==    definitely lost: 2,189 bytes in 12 blocks
==9989==    indirectly lost: 6,756 bytes in 7 blocks
==9989==      possibly lost: 0 bytes in 0 blocks
==9989==    still reachable: 3,154,599 bytes in 69,167 blocks
==9989==         suppressed: 0 bytes in 0 blocks
==9989== Rerun with --leak-check=full to see details of leaked memory
==9989== 
==9989== Use --track-origins=yes to see where uninitialised values come from
==9989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9989== 
==9989== 1 errors in context 1 of 2:
==9989== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9989==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9989==    by 0x488CD0: stringsubst (subst.c:301)
==9989==    by 0x48801B: prefork (subst.c:77)
==9989==    by 0x42B318: execcmd (exec.c:2619)
==9989==    by 0x428CA0: execpline2 (exec.c:1697)
==9989==    by 0x427FD2: execpline (exec.c:1484)
==9989==    by 0x427756: execlist (exec.c:1267)
==9989==    by 0x42717C: execode (exec.c:1073)
==9989==    by 0x431299: runshfunc (exec.c:5040)
==9989==    by 0x430E76: doshfunc (exec.c:4920)
==9989==    by 0x4302FB: execshfunc (exec.c:4557)
==9989==    by 0x42D8C1: execcmd (exec.c:3373)
==9989== 
==9989== 
==9989== 2 errors in context 2 of 2:
==9989== Conditional jump or move depends on uninitialised value(s)
==9989==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9989==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9989==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9989==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9989==    by 0x42D8E9: execcmd (exec.c:3378)
==9989==    by 0x428CA0: execpline2 (exec.c:1697)
==9989==    by 0x427FD2: execpline (exec.c:1484)
==9989==    by 0x42779A: execlist (exec.c:1275)
==9989==    by 0x42717C: execode (exec.c:1073)
==9989==    by 0x431299: runshfunc (exec.c:5040)
==9989==    by 0x430E76: doshfunc (exec.c:4920)
==9989==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9989== 
==9989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9990== Checked 5,066,936 bytes
==9990== 
==9990== LEAK SUMMARY:
==9990==    definitely lost: 2,213 bytes in 13 blocks
==9990==    indirectly lost: 6,796 bytes in 9 blocks
==9990==      possibly lost: 0 bytes in 0 blocks
==9990==    still reachable: 3,133,063 bytes in 69,164 blocks
==9990==         suppressed: 0 bytes in 0 blocks
==9990== Rerun with --leak-check=full to see details of leaked memory
==9990== 
==9990== Use --track-origins=yes to see where uninitialised values come from
==9990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9990== 
==9990== 1 errors in context 1 of 2:
==9990== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9990==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9990==    by 0x488CD0: stringsubst (subst.c:301)
==9990==    by 0x48801B: prefork (subst.c:77)
==9990==    by 0x42B318: execcmd (exec.c:2619)
==9990==    by 0x428CA0: execpline2 (exec.c:1697)
==9990==    by 0x427FD2: execpline (exec.c:1484)
==9990==    by 0x427756: execlist (exec.c:1267)
==9990==    by 0x42717C: execode (exec.c:1073)
==9990==    by 0x431299: runshfunc (exec.c:5040)
==9990==    by 0x430E76: doshfunc (exec.c:4920)
==9990==    by 0x4302FB: execshfunc (exec.c:4557)
==9990==    by 0x42D8C1: execcmd (exec.c:3373)
==9990== 
==9990== 
==9990== 2 errors in context 2 of 2:
==9990== Conditional jump or move depends on uninitialised value(s)
==9990==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9990==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9990==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9990==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9990==    by 0x42D8E9: execcmd (exec.c:3378)
==9990==    by 0x428CA0: execpline2 (exec.c:1697)
==9990==    by 0x427FD2: execpline (exec.c:1484)
==9990==    by 0x42779A: execlist (exec.c:1275)
==9990==    by 0x42717C: execode (exec.c:1073)
==9990==    by 0x431299: runshfunc (exec.c:5040)
==9990==    by 0x430E76: doshfunc (exec.c:4920)
==9990==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9990== 
==9990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9993== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9993-by-pythonnut-on-???
==9993== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9993-by-pythonnut-on-???
==9993== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9993-by-pythonnut-on-???
==9993== 
==9993== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9993== don't want to do, unless you know exactly what you're doing,
==9993== or are doing some strange experiment):
==9993==   /usr/lib/valgrind/../../bin/vgdb --pid=9993 ...command...
==9993== 
==9993== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9993==   /path/to/gdb ./zsh
==9993== and then give GDB the following command
==9993==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9993
==9993== --pid is optional if only one valgrind process is running
==9993== 
client request: code 4d430005,  addr 0xFFEFEE97C,  len 4
--9968-- Caught __NR_exit; running __libc_freeres()
==9983== Checked 4,784,488 bytes
==9983== 
==9992== Checked 4,790,360 bytes
==9992== 
--9968-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9983== LEAK SUMMARY:
==9983==    definitely lost: 2,189 bytes in 12 blocks
==9983==    indirectly lost: 6,756 bytes in 7 blocks
==9983==      possibly lost: 0 bytes in 0 blocks
==9983==    still reachable: 3,114,874 bytes in 69,131 blocks
==9983==         suppressed: 0 bytes in 0 blocks
==9983== Rerun with --leak-check=full to see details of leaked memory
==9983== 
==9983== Use --track-origins=yes to see where uninitialised values come from
==9983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9983== 
==9983== 1 errors in context 1 of 2:
==9983== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9983==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9983==    by 0x488CD0: stringsubst (subst.c:301)
==9983==    by 0x48801B: prefork (subst.c:77)
==9983==    by 0x42B318: execcmd (exec.c:2619)
==9983==    by 0x428CA0: execpline2 (exec.c:1697)
==9983==    by 0x427FD2: execpline (exec.c:1484)
==9983==    by 0x427756: execlist (exec.c:1267)
==9983==    by 0x42717C: execode (exec.c:1073)
==9983==    by 0x431299: runshfunc (exec.c:5040)
==9983==    by 0x430E76: doshfunc (exec.c:4920)
==9983==    by 0x4302FB: execshfunc (exec.c:4557)
==9983==    by 0x42D8C1: execcmd (exec.c:3373)
==9983== 
==9983== 
==9983== 2 errors in context 2 of 2:
==9983== Conditional jump or move depends on uninitialised value(s)
==9983==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9983==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9983==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9983==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9983==    by 0x42D8E9: execcmd (exec.c:3378)
==9983==    by 0x428CA0: execpline2 (exec.c:1697)
==9983==    by 0x427FD2: execpline (exec.c:1484)
==9983==    by 0x42779A: execlist (exec.c:1275)
==9983==    by 0x42717C: execode (exec.c:1073)
==9983==    by 0x431299: runshfunc (exec.c:5040)
==9983==    by 0x430E76: doshfunc (exec.c:4920)
==9983==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9983== 
==9983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9968== 
==9968== HEAP SUMMARY:
==9968==     in use at exit: 3,119,891 bytes in 69,168 blocks
==9968==   total heap usage: 1,592,310 allocs, 1,523,142 frees, 128,686,952 bytes allocated
==9968== 
==9992== LEAK SUMMARY:
==9992==    definitely lost: 2,189 bytes in 12 blocks
==9992==    indirectly lost: 6,756 bytes in 7 blocks
==9992==      possibly lost: 0 bytes in 0 blocks
==9992==    still reachable: 3,106,311 bytes in 68,987 blocks
==9992==         suppressed: 0 bytes in 0 blocks
==9992== Rerun with --leak-check=full to see details of leaked memory
==9992== 
==9992== Use --track-origins=yes to see where uninitialised values come from
==9992== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9992== 
==9992== 1 errors in context 1 of 2:
==9992== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9992==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9992==    by 0x488CD0: stringsubst (subst.c:301)
==9992==    by 0x48801B: prefork (subst.c:77)
==9992==    by 0x42B318: execcmd (exec.c:2619)
==9992==    by 0x428CA0: execpline2 (exec.c:1697)
==9992==    by 0x427FD2: execpline (exec.c:1484)
==9992==    by 0x427756: execlist (exec.c:1267)
==9992==    by 0x42717C: execode (exec.c:1073)
==9992==    by 0x431299: runshfunc (exec.c:5040)
==9992==    by 0x430E76: doshfunc (exec.c:4920)
==9992==    by 0x4302FB: execshfunc (exec.c:4557)
==9992==    by 0x42D8C1: execcmd (exec.c:3373)
==9992== 
==9992== 
==9992== 2 errors in context 2 of 2:
==9992== Conditional jump or move depends on uninitialised value(s)
==9992==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9992==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9992==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9992==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9992==    by 0x42D8E9: execcmd (exec.c:3378)
==9992==    by 0x428CA0: execpline2 (exec.c:1697)
==9992==    by 0x427FD2: execpline (exec.c:1484)
==9992==    by 0x42779A: execlist (exec.c:1275)
==9992==    by 0x42717C: execode (exec.c:1073)
==9992==    by 0x431299: runshfunc (exec.c:5040)
==9992==    by 0x430E76: doshfunc (exec.c:4920)
==9992==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9992== 
==9992== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9994-- Caught __NR_exit; running __libc_freeres()
==9995== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9995-by-pythonnut-on-???
==9995== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9995-by-pythonnut-on-???
==9995== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9995-by-pythonnut-on-???
==9995== 
==9995== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9995== don't want to do, unless you know exactly what you're doing,
==9995== or are doing some strange experiment):
==9995==   /usr/lib/valgrind/../../bin/vgdb --pid=9995 ...command...
==9995== 
==9995== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9995==   /path/to/gdb ./zsh
==9995== and then give GDB the following command
==9995==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9995
==9995== --pid is optional if only one valgrind process is running
==9995== 
--9995-- Caught __NR_exit; running __libc_freeres()
==9968== Searching for pointers to 69,168 not-freed blocks
--9968--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9968--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9968--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9968--   Scanning root segment: 0x4037000..0x403afff (16384)
--9968--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9968--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9968--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9968--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9968--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9968--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9968--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9968--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9968--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9968--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9968--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9968--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9968--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9968--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9968--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9968--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9968--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9968--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9968--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9968--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9968--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9968--   Scanning root segment: 0x701a000..0x701afff (4096)
--9968--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9968--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9968--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9968--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9968--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9968--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9968--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9968--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9968--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9968--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9994== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9994-by-pythonnut-on-???
==9994== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9994-by-pythonnut-on-???
==9994== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9994-by-pythonnut-on-???
==9994== 
==9994== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9994== don't want to do, unless you know exactly what you're doing,
==9994== or are doing some strange experiment):
==9994==   /usr/lib/valgrind/../../bin/vgdb --pid=9994 ...command...
==9994== 
==9994== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9994==   /path/to/gdb ./zsh
==9994== and then give GDB the following command
==9994==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9994
==9994== --pid is optional if only one valgrind process is running
==9994== 
--9994-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9995-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9994== 
==9994== HEAP SUMMARY:
==9994==     in use at exit: 3,123,826 bytes in 69,150 blocks
==9994==   total heap usage: 1,592,594 allocs, 1,523,444 frees, 128,536,487 bytes allocated
==9994== 
==9995== 
==9995== HEAP SUMMARY:
==9995==     in use at exit: 3,115,255 bytes in 69,006 blocks
==9995==   total heap usage: 1,592,284 allocs, 1,523,278 frees, 128,620,015 bytes allocated
==9995== 
==9994== Searching for pointers to 69,150 not-freed blocks
--9994--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9994--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9994--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9994--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9994--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9994--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9994--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9994--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9994--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9994--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9994--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9994--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9994--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9994--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9994--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9994--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9994--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9994--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9994--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9994--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9994--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9994--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9994--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9994--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9994--   Scanning root segment: 0x701a000..0x701afff (4096)
--9994--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9994--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9994--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9994--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9994--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9994--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9994--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9994--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9994--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9994--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9995== Searching for pointers to 69,006 not-freed blocks
--9995--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9995--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9995--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9995--   Scanning root segment: 0x4037000..0x403afff (16384)
--9995--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9995--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9995--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9995--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9995--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9995--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9995--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9995--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9995--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9995--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9995--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9995--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9995--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9995--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9995--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9995--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9995--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9995--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9995--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9995--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9995--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9995--   Scanning root segment: 0x701a000..0x701afff (4096)
--9995--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9995--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9995--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9995--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9995--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9995--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9995--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9995--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9995--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9995--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9968== Checked 4,796,920 bytes
==9968== 
==9968== LEAK SUMMARY:
==9968==    definitely lost: 2,189 bytes in 12 blocks
==9968==    indirectly lost: 6,756 bytes in 7 blocks
==9968==      possibly lost: 0 bytes in 0 blocks
==9968==    still reachable: 3,110,946 bytes in 69,149 blocks
==9968==         suppressed: 0 bytes in 0 blocks
==9968== Rerun with --leak-check=full to see details of leaked memory
==9968== 
==9968== Use --track-origins=yes to see where uninitialised values come from
==9968== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9968== 
==9968== 1 errors in context 1 of 2:
==9968== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9968==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9968==    by 0x488CD0: stringsubst (subst.c:301)
==9968==    by 0x48801B: prefork (subst.c:77)
==9968==    by 0x42B318: execcmd (exec.c:2619)
==9968==    by 0x428CA0: execpline2 (exec.c:1697)
==9968==    by 0x427FD2: execpline (exec.c:1484)
==9968==    by 0x427756: execlist (exec.c:1267)
==9968==    by 0x42717C: execode (exec.c:1073)
==9968==    by 0x431299: runshfunc (exec.c:5040)
==9968==    by 0x430E76: doshfunc (exec.c:4920)
==9968==    by 0x4302FB: execshfunc (exec.c:4557)
==9968==    by 0x42D8C1: execcmd (exec.c:3373)
==9968== 
==9968== 
==9968== 2 errors in context 2 of 2:
==9968== Conditional jump or move depends on uninitialised value(s)
==9968==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9968==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9968==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9968==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9968==    by 0x42D8E9: execcmd (exec.c:3378)
==9968==    by 0x428CA0: execpline2 (exec.c:1697)
==9968==    by 0x427FD2: execpline (exec.c:1484)
==9968==    by 0x42779A: execlist (exec.c:1275)
==9968==    by 0x42717C: execode (exec.c:1073)
==9968==    by 0x431299: runshfunc (exec.c:5040)
==9968==    by 0x430E76: doshfunc (exec.c:4920)
==9968==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9968== 
==9968== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9994== Checked 4,784,632 bytes
==9994== 
==9996== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9996-by-pythonnut-on-???
==9996== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9996-by-pythonnut-on-???
==9996== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9996-by-pythonnut-on-???
==9996== 
==9996== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9996== don't want to do, unless you know exactly what you're doing,
==9996== or are doing some strange experiment):
==9996==   /usr/lib/valgrind/../../bin/vgdb --pid=9996 ...command...
==9996== 
==9996== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9996==   /path/to/gdb ./zsh
==9996== and then give GDB the following command
==9996==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9996
==9996== --pid is optional if only one valgrind process is running
==9996== 
==9995== Checked 4,790,360 bytes
==9995== 
--9996-- Caught __NR_exit; running __libc_freeres()
==9994== LEAK SUMMARY:
==9994==    definitely lost: 2,189 bytes in 12 blocks
==9994==    indirectly lost: 6,756 bytes in 7 blocks
==9994==      possibly lost: 0 bytes in 0 blocks
==9994==    still reachable: 3,114,881 bytes in 69,131 blocks
==9994==         suppressed: 0 bytes in 0 blocks
==9994== Rerun with --leak-check=full to see details of leaked memory
==9994== 
==9994== Use --track-origins=yes to see where uninitialised values come from
==9994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9994== 
==9994== 1 errors in context 1 of 2:
==9994== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9994==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9994==    by 0x488CD0: stringsubst (subst.c:301)
==9994==    by 0x48801B: prefork (subst.c:77)
==9994==    by 0x42B318: execcmd (exec.c:2619)
==9994==    by 0x428CA0: execpline2 (exec.c:1697)
==9994==    by 0x427FD2: execpline (exec.c:1484)
==9994==    by 0x427756: execlist (exec.c:1267)
==9994==    by 0x42717C: execode (exec.c:1073)
==9994==    by 0x431299: runshfunc (exec.c:5040)
==9994==    by 0x430E76: doshfunc (exec.c:4920)
==9994==    by 0x4302FB: execshfunc (exec.c:4557)
==9994==    by 0x42D8C1: execcmd (exec.c:3373)
==9994== 
==9994== 
==9994== 2 errors in context 2 of 2:
==9994== Conditional jump or move depends on uninitialised value(s)
==9994==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9994==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9994==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9994==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9994==    by 0x42D8E9: execcmd (exec.c:3378)
==9994==    by 0x428CA0: execpline2 (exec.c:1697)
==9994==    by 0x427FD2: execpline (exec.c:1484)
==9994==    by 0x42779A: execlist (exec.c:1275)
==9994==    by 0x42717C: execode (exec.c:1073)
==9994==    by 0x431299: runshfunc (exec.c:5040)
==9994==    by 0x430E76: doshfunc (exec.c:4920)
==9994==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9994== 
==9994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF77C,  len 4
==9995== LEAK SUMMARY:
==9995==    definitely lost: 2,189 bytes in 12 blocks
==9995==    indirectly lost: 6,756 bytes in 7 blocks
==9995==      possibly lost: 0 bytes in 0 blocks
==9995==    still reachable: 3,106,310 bytes in 68,987 blocks
==9995==         suppressed: 0 bytes in 0 blocks
==9995== Rerun with --leak-check=full to see details of leaked memory
==9995== 
==9995== Use --track-origins=yes to see where uninitialised values come from
==9995== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9995== 
==9995== 1 errors in context 1 of 2:
==9995== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9995==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9995==    by 0x488CD0: stringsubst (subst.c:301)
==9995==    by 0x48801B: prefork (subst.c:77)
==9995==    by 0x42B318: execcmd (exec.c:2619)
==9995==    by 0x428CA0: execpline2 (exec.c:1697)
==9995==    by 0x427FD2: execpline (exec.c:1484)
==9995==    by 0x427756: execlist (exec.c:1267)
==9995==    by 0x42717C: execode (exec.c:1073)
==9995==    by 0x431299: runshfunc (exec.c:5040)
==9995==    by 0x430E76: doshfunc (exec.c:4920)
==9995==    by 0x4302FB: execshfunc (exec.c:4557)
==9995==    by 0x42D8C1: execcmd (exec.c:3373)
==9995== 
==9995== 
==9995== 2 errors in context 2 of 2:
==9995== Conditional jump or move depends on uninitialised value(s)
==9995==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9995==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9995==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9995==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9995==    by 0x42D8E9: execcmd (exec.c:3378)
==9995==    by 0x428CA0: execpline2 (exec.c:1697)
==9995==    by 0x427FD2: execpline (exec.c:1484)
==9995==    by 0x42779A: execlist (exec.c:1275)
==9995==    by 0x42717C: execode (exec.c:1073)
==9995==    by 0x431299: runshfunc (exec.c:5040)
==9995==    by 0x430E76: doshfunc (exec.c:4920)
==9995==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9995== 
==9995== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9999== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9999-by-pythonnut-on-???
==9999== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9999-by-pythonnut-on-???
==9999== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9999-by-pythonnut-on-???
==9999== 
==9999== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9999== don't want to do, unless you know exactly what you're doing,
==9999== or are doing some strange experiment):
==9999==   /usr/lib/valgrind/../../bin/vgdb --pid=9999 ...command...
==9999== 
==9999== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9999==   /path/to/gdb ./zsh
==9999== and then give GDB the following command
==9999==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9999
==9999== --pid is optional if only one valgrind process is running
==9999== 
==9998== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9998-by-pythonnut-on-???
==9998== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9998-by-pythonnut-on-???
==9998== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9998-by-pythonnut-on-???
==9998== 
==9998== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9998== don't want to do, unless you know exactly what you're doing,
==9998== or are doing some strange experiment):
==9998==   /usr/lib/valgrind/../../bin/vgdb --pid=9998 ...command...
==9998== 
==9998== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9998==   /path/to/gdb ./zsh
==9998== and then give GDB the following command
==9998==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9998
==9998== --pid is optional if only one valgrind process is running
==9998== 
--9999-- Caught __NR_exit; running __libc_freeres()
--9996-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9996== 
--9998-- Caught __NR_exit; running __libc_freeres()
==9996== HEAP SUMMARY:
==9996==     in use at exit: 3,157,401 bytes in 69,169 blocks
==9996==   total heap usage: 1,592,274 allocs, 1,523,105 frees, 128,637,790 bytes allocated
==9996== 
--9999-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9998-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9996== Searching for pointers to 69,169 not-freed blocks
--9996--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9996--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9999== 
--9996--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9996--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9996--   Scanning root segment: 0x41d6000..0x41edfff (98304)
--9996--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9996--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9996--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9996--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9996--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9996--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9996--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9996--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9996--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9996--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9996--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9996--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9996--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9996--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9996--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9996--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9996--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9996--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9996--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==9999== HEAP SUMMARY:
==9999==     in use at exit: 3,115,254 bytes in 69,006 blocks
==9999==   total heap usage: 1,592,292 allocs, 1,523,286 frees, 128,623,668 bytes allocated
==9999== 
--9996--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9996--   Scanning root segment: 0x701a000..0x701afff (4096)
--9996--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9996--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9996--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9996--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9996--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9996--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9996--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9996--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9996--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9996--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9998== 
==9998== HEAP SUMMARY:
==9998==     in use at exit: 3,123,922 bytes in 69,150 blocks
==9998==   total heap usage: 1,592,610 allocs, 1,523,460 frees, 128,541,274 bytes allocated
==9998== 
==9998== Searching for pointers to 69,150 not-freed blocks
--9998--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9998--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9998--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9998--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9998--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9998--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9998--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9998--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9998--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9998--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9998--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9998--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9998--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9998--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9998--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9998--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9998--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9998--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9998--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9998--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9998--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9998--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9998--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9998--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9998--   Scanning root segment: 0x701a000..0x701afff (4096)
--9998--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9998--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9998--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9998--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9998--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9998--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9998--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9998--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9998--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9998--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9999== Searching for pointers to 69,006 not-freed blocks
--9999--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9999--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9999--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9999--   Scanning root segment: 0x4037000..0x403afff (16384)
--9999--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9999--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9999--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9999--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9999--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9999--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9999--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9999--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9999--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9999--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9999--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9999--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9999--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9999--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9999--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9999--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9999--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9999--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9999--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9999--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9999--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9999--   Scanning root segment: 0x701a000..0x701afff (4096)
--9999--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9999--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9999--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9999--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9999--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9999--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9999--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9999--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9999--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9999--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9996== Checked 4,990,792 bytes
==9996== 
==9996== LEAK SUMMARY:
==9996==    definitely lost: 2,189 bytes in 12 blocks
==9996==    indirectly lost: 6,756 bytes in 7 blocks
==9996==      possibly lost: 0 bytes in 0 blocks
==9996==    still reachable: 3,148,456 bytes in 69,150 blocks
==9996==         suppressed: 0 bytes in 0 blocks
==9996== Rerun with --leak-check=full to see details of leaked memory
==9996== 
==9996== Use --track-origins=yes to see where uninitialised values come from
==9996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9996== 
==9996== 1 errors in context 1 of 2:
==9996== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9996==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9996==    by 0x488CD0: stringsubst (subst.c:301)
==9996==    by 0x48801B: prefork (subst.c:77)
==9996==    by 0x42B318: execcmd (exec.c:2619)
==9996==    by 0x428CA0: execpline2 (exec.c:1697)
==9996==    by 0x427FD2: execpline (exec.c:1484)
==9996==    by 0x427756: execlist (exec.c:1267)
==9996==    by 0x42717C: execode (exec.c:1073)
==9996==    by 0x431299: runshfunc (exec.c:5040)
==9996==    by 0x430E76: doshfunc (exec.c:4920)
==9996==    by 0x4302FB: execshfunc (exec.c:4557)
==9996==    by 0x42D8C1: execcmd (exec.c:3373)
==9996== 
==9996== 
==9996== 2 errors in context 2 of 2:
==9996== Conditional jump or move depends on uninitialised value(s)
==9996==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9996==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9996==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9996==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9996==    by 0x42D8E9: execcmd (exec.c:3378)
==9996==    by 0x428CA0: execpline2 (exec.c:1697)
==9996==    by 0x427FD2: execpline (exec.c:1484)
==9996==    by 0x42779A: execlist (exec.c:1275)
==9996==    by 0x42717C: execode (exec.c:1073)
==9996==    by 0x431299: runshfunc (exec.c:5040)
==9996==    by 0x430E76: doshfunc (exec.c:4920)
==9996==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9996== 
==9996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9967-- Caught __NR_exit; running __libc_freeres()
==9998== Checked 4,783,912 bytes
==9998== 
==9999== Checked 4,790,360 bytes
==9999== 
==9998== LEAK SUMMARY:
==9998==    definitely lost: 2,189 bytes in 12 blocks
==9998==    indirectly lost: 6,756 bytes in 7 blocks
==9998==      possibly lost: 0 bytes in 0 blocks
==9998==    still reachable: 3,114,977 bytes in 69,131 blocks
==9998==         suppressed: 0 bytes in 0 blocks
==9998== Rerun with --leak-check=full to see details of leaked memory
==9998== 
==9998== Use --track-origins=yes to see where uninitialised values come from
==9998== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9998== 
==9998== 1 errors in context 1 of 2:
==9998== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9998==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9998==    by 0x488CD0: stringsubst (subst.c:301)
==9998==    by 0x48801B: prefork (subst.c:77)
==9998==    by 0x42B318: execcmd (exec.c:2619)
==9998==    by 0x428CA0: execpline2 (exec.c:1697)
==9998==    by 0x427FD2: execpline (exec.c:1484)
==9998==    by 0x427756: execlist (exec.c:1267)
==9998==    by 0x42717C: execode (exec.c:1073)
==9998==    by 0x431299: runshfunc (exec.c:5040)
==9998==    by 0x430E76: doshfunc (exec.c:4920)
==9998==    by 0x4302FB: execshfunc (exec.c:4557)
==9998==    by 0x42D8C1: execcmd (exec.c:3373)
==9998== 
==9998== 
==9998== 2 errors in context 2 of 2:
==9998== Conditional jump or move depends on uninitialised value(s)
==9998==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9998==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9998==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9998==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9998==    by 0x42D8E9: execcmd (exec.c:3378)
==9998==    by 0x428CA0: execpline2 (exec.c:1697)
==9998==    by 0x427FD2: execpline (exec.c:1484)
==9998==    by 0x42779A: execlist (exec.c:1275)
==9998==    by 0x42717C: execode (exec.c:1073)
==9998==    by 0x431299: runshfunc (exec.c:5040)
==9998==    by 0x430E76: doshfunc (exec.c:4920)
==9998==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9998== 
==9998== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9967-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9967== 
==9967== HEAP SUMMARY:
==9967==     in use at exit: 3,118,632 bytes in 69,135 blocks
==9967==   total heap usage: 1,592,277 allocs, 1,523,142 frees, 128,638,366 bytes allocated
==9967== 
==9999== LEAK SUMMARY:
==9999==    definitely lost: 2,189 bytes in 12 blocks
==9999==    indirectly lost: 6,756 bytes in 7 blocks
==9999==      possibly lost: 0 bytes in 0 blocks
==9999==    still reachable: 3,106,309 bytes in 68,987 blocks
==9999==         suppressed: 0 bytes in 0 blocks
==9999== Rerun with --leak-check=full to see details of leaked memory
==9999== 
==9999== Use --track-origins=yes to see where uninitialised values come from
==9999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9999== 
==9999== 1 errors in context 1 of 2:
==9999== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9999==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9999==    by 0x488CD0: stringsubst (subst.c:301)
==9999==    by 0x48801B: prefork (subst.c:77)
==9999==    by 0x42B318: execcmd (exec.c:2619)
==9999==    by 0x428CA0: execpline2 (exec.c:1697)
==9999==    by 0x427FD2: execpline (exec.c:1484)
==9999==    by 0x427756: execlist (exec.c:1267)
==9999==    by 0x42717C: execode (exec.c:1073)
==9999==    by 0x431299: runshfunc (exec.c:5040)
==9999==    by 0x430E76: doshfunc (exec.c:4920)
==9999==    by 0x4302FB: execshfunc (exec.c:4557)
==9999==    by 0x42D8C1: execcmd (exec.c:3373)
==9999== 
==9999== 
==9999== 2 errors in context 2 of 2:
==9999== Conditional jump or move depends on uninitialised value(s)
==9999==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9999==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9999==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9999==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9999==    by 0x42D8E9: execcmd (exec.c:3378)
==9999==    by 0x428CA0: execpline2 (exec.c:1697)
==9999==    by 0x427FD2: execpline (exec.c:1484)
==9999==    by 0x42779A: execlist (exec.c:1275)
==9999==    by 0x42717C: execode (exec.c:1073)
==9999==    by 0x431299: runshfunc (exec.c:5040)
==9999==    by 0x430E76: doshfunc (exec.c:4920)
==9999==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9999== 
==9999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10000-by-pythonnut-on-???
==10000== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10000-by-pythonnut-on-???
==10000== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10000-by-pythonnut-on-???
==10000== 
==10000== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10000== don't want to do, unless you know exactly what you're doing,
==10000== or are doing some strange experiment):
==10000==   /usr/lib/valgrind/../../bin/vgdb --pid=10000 ...command...
==10000== 
==10000== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10000==   /path/to/gdb ./zsh
==10000== and then give GDB the following command
==10000==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10000
==10000== --pid is optional if only one valgrind process is running
==10000== 
--10001-- Caught __NR_exit; running __libc_freeres()
==10001== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10001-by-pythonnut-on-???
==10001== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10001-by-pythonnut-on-???
==10001== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10001-by-pythonnut-on-???
==10001== 
==10001== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10001== don't want to do, unless you know exactly what you're doing,
==10001== or are doing some strange experiment):
==10001==   /usr/lib/valgrind/../../bin/vgdb --pid=10001 ...command...
==10001== 
==10001== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10001==   /path/to/gdb ./zsh
==10001== and then give GDB the following command
==10001==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10001
==10001== --pid is optional if only one valgrind process is running
==10001== 
--10000-- Caught __NR_exit; running __libc_freeres()
==9967== Searching for pointers to 69,135 not-freed blocks
--9967--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9967--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9967--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9967--   Scanning root segment: 0x4037000..0x403afff (16384)
--9967--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9967--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9967--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9967--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9967--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9967--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9967--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9967--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9967--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9967--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9967--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9967--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9967--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9967--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9967--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9967--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9967--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9967--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9967--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9967--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9967--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9967--   Scanning root segment: 0x701a000..0x701afff (4096)
--9967--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9967--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9967--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9967--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9967--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9967--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9967--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9967--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9967--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9967--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10001-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10000-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10001== 
==10001== HEAP SUMMARY:
==10001==     in use at exit: 3,115,257 bytes in 69,006 blocks
==10001==   total heap usage: 1,592,294 allocs, 1,523,288 frees, 128,624,245 bytes allocated
==10001== 
==10000== 
==10000== HEAP SUMMARY:
==10000==     in use at exit: 3,124,164 bytes in 69,156 blocks
==10000==   total heap usage: 1,592,658 allocs, 1,523,502 frees, 128,550,290 bytes allocated
==10000== 
==10001== Searching for pointers to 69,006 not-freed blocks
--10001--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10001--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10001--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10001--   Scanning root segment: 0x4037000..0x403afff (16384)
--10001--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10001--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10001--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10001--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10001--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10001--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10001--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10001--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10001--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10001--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10001--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10001--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10001--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10001--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10001--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10001--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10001--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10001--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10001--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10001--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10001--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10001--   Scanning root segment: 0x701a000..0x701afff (4096)
--10001--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10001--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10001--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10001--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10001--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10001--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10001--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10001--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10001--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10001--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10000== Searching for pointers to 69,156 not-freed blocks
--10000--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10000--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10000--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10000--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10000--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10000--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10000--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10000--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10000--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10000--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10000--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10000--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10000--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10000--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10000--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10000--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10000--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10000--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10000--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10000--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10000--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10000--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10000--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10000--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10000--   Scanning root segment: 0x701a000..0x701afff (4096)
--10000--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10000--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10000--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10000--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10000--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10000--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10000--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10000--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10000--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10000--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9967== Checked 4,793,912 bytes
==9967== 
==9967== LEAK SUMMARY:
==9967==    definitely lost: 2,189 bytes in 12 blocks
==9967==    indirectly lost: 6,756 bytes in 7 blocks
==9967==      possibly lost: 0 bytes in 0 blocks
==9967==    still reachable: 3,109,687 bytes in 69,116 blocks
==9967==         suppressed: 0 bytes in 0 blocks
==9967== Rerun with --leak-check=full to see details of leaked memory
==9967== 
==9967== Use --track-origins=yes to see where uninitialised values come from
==9967== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9967== 
==9967== 1 errors in context 1 of 2:
==9967== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9967==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9967==    by 0x488CD0: stringsubst (subst.c:301)
==9967==    by 0x48801B: prefork (subst.c:77)
==9967==    by 0x42B318: execcmd (exec.c:2619)
==9967==    by 0x428CA0: execpline2 (exec.c:1697)
==9967==    by 0x427FD2: execpline (exec.c:1484)
==9967==    by 0x427756: execlist (exec.c:1267)
==9967==    by 0x42717C: execode (exec.c:1073)
==9967==    by 0x431299: runshfunc (exec.c:5040)
==9967==    by 0x430E76: doshfunc (exec.c:4920)
==9967==    by 0x4302FB: execshfunc (exec.c:4557)
==9967==    by 0x42D8C1: execcmd (exec.c:3373)
==9967== 
==9967== 
==9967== 2 errors in context 2 of 2:
==9967== Conditional jump or move depends on uninitialised value(s)
==9967==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9967==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9967==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9967==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9967==    by 0x42D8E9: execcmd (exec.c:3378)
==9967==    by 0x428CA0: execpline2 (exec.c:1697)
==9967==    by 0x427FD2: execpline (exec.c:1484)
==9967==    by 0x42779A: execlist (exec.c:1275)
==9967==    by 0x42717C: execode (exec.c:1073)
==9967==    by 0x431299: runshfunc (exec.c:5040)
==9967==    by 0x430E76: doshfunc (exec.c:4920)
==9967==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9967== 
==9967== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10001== Checked 4,790,360 bytes
==10001== 
==10000== Checked 4,784,080 bytes
==10000== 
==10001== LEAK SUMMARY:
==10001==    definitely lost: 2,189 bytes in 12 blocks
==10001==    indirectly lost: 6,756 bytes in 7 blocks
==10001==      possibly lost: 0 bytes in 0 blocks
==10001==    still reachable: 3,106,312 bytes in 68,987 blocks
==10001==         suppressed: 0 bytes in 0 blocks
==10001== Rerun with --leak-check=full to see details of leaked memory
==10001== 
==10001== Use --track-origins=yes to see where uninitialised values come from
==10001== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10001== 
==10001== 1 errors in context 1 of 2:
==10001== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10001==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10001==    by 0x488CD0: stringsubst (subst.c:301)
==10001==    by 0x48801B: prefork (subst.c:77)
==10001==    by 0x42B318: execcmd (exec.c:2619)
==10001==    by 0x428CA0: execpline2 (exec.c:1697)
==10001==    by 0x427FD2: execpline (exec.c:1484)
==10001==    by 0x427756: execlist (exec.c:1267)
==10001==    by 0x42717C: execode (exec.c:1073)
==10001==    by 0x431299: runshfunc (exec.c:5040)
==10001==    by 0x430E76: doshfunc (exec.c:4920)
==10001==    by 0x4302FB: execshfunc (exec.c:4557)
==10001==    by 0x42D8C1: execcmd (exec.c:3373)
==10001== 
==10001== 
==10001== 2 errors in context 2 of 2:
==10001== Conditional jump or move depends on uninitialised value(s)
==10001==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10001==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10001==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10001==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10001==    by 0x42D8E9: execcmd (exec.c:3378)
==10001==    by 0x428CA0: execpline2 (exec.c:1697)
==10001==    by 0x427FD2: execpline (exec.c:1484)
==10001==    by 0x42779A: execlist (exec.c:1275)
==10001==    by 0x42717C: execode (exec.c:1073)
==10001==    by 0x431299: runshfunc (exec.c:5040)
==10001==    by 0x430E76: doshfunc (exec.c:4920)
==10001==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10001== 
==10001== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== LEAK SUMMARY:
==10000==    definitely lost: 2,189 bytes in 12 blocks
==10000==    indirectly lost: 6,756 bytes in 7 blocks
==10000==      possibly lost: 0 bytes in 0 blocks
==10000==    still reachable: 3,115,219 bytes in 69,137 blocks
==10000==         suppressed: 0 bytes in 0 blocks
==10000== Rerun with --leak-check=full to see details of leaked memory
==10000== 
==10000== Use --track-origins=yes to see where uninitialised values come from
==10000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== 
==10000== 1 errors in context 1 of 2:
==10000== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10000==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10000==    by 0x488CD0: stringsubst (subst.c:301)
==10000==    by 0x48801B: prefork (subst.c:77)
==10000==    by 0x42B318: execcmd (exec.c:2619)
==10000==    by 0x428CA0: execpline2 (exec.c:1697)
==10000==    by 0x427FD2: execpline (exec.c:1484)
==10000==    by 0x427756: execlist (exec.c:1267)
==10000==    by 0x42717C: execode (exec.c:1073)
==10000==    by 0x431299: runshfunc (exec.c:5040)
==10000==    by 0x430E76: doshfunc (exec.c:4920)
==10000==    by 0x4302FB: execshfunc (exec.c:4557)
==10000==    by 0x42D8C1: execcmd (exec.c:3373)
==10000== 
==10000== 
==10000== 2 errors in context 2 of 2:
==10000== Conditional jump or move depends on uninitialised value(s)
==10000==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10000==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10000==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10000==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10000==    by 0x42D8E9: execcmd (exec.c:3378)
==10000==    by 0x428CA0: execpline2 (exec.c:1697)
==10000==    by 0x427FD2: execpline (exec.c:1484)
==10000==    by 0x42779A: execlist (exec.c:1275)
==10000==    by 0x42717C: execode (exec.c:1073)
==10000==    by 0x431299: runshfunc (exec.c:5040)
==10000==    by 0x430E76: doshfunc (exec.c:4920)
==10000==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10000== 
==10000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10004== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10004-by-pythonnut-on-???
==10004== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10004-by-pythonnut-on-???
==10004== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10004-by-pythonnut-on-???
==10004== 
==10004== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10004== don't want to do, unless you know exactly what you're doing,
==10004== or are doing some strange experiment):
==10004==   /usr/lib/valgrind/../../bin/vgdb --pid=10004 ...command...
==10004== 
==10004== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10004==   /path/to/gdb ./zsh
==10004== and then give GDB the following command
==10004==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10004
==10004== --pid is optional if only one valgrind process is running
==10004== 
--10006-- Caught __NR_exit; running __libc_freeres()
==10006== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10006-by-pythonnut-on-???
==10006== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10006-by-pythonnut-on-???
==10006== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10006-by-pythonnut-on-???
==10006== 
==10006== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10006== don't want to do, unless you know exactly what you're doing,
==10006== or are doing some strange experiment):
==10006==   /usr/lib/valgrind/../../bin/vgdb --pid=10006 ...command...
==10006== 
==10006== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10006==   /path/to/gdb ./zsh
==10006== and then give GDB the following command
==10006==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10006
==10006== --pid is optional if only one valgrind process is running
==10006== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--10005-- Caught __NR_exit; running __libc_freeres()
--10006-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10005== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10005-by-pythonnut-on-???
==10005== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10005-by-pythonnut-on-???
==10005== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10005-by-pythonnut-on-???
==10005== 
==10005== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10005== don't want to do, unless you know exactly what you're doing,
==10005== or are doing some strange experiment):
==10005==   /usr/lib/valgrind/../../bin/vgdb --pid=10005 ...command...
==10005== 
==10005== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10005==   /path/to/gdb ./zsh
==10005== and then give GDB the following command
==10005==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10005
==10005== --pid is optional if only one valgrind process is running
==10005== 
==10006== 
==10006== HEAP SUMMARY:
==10006==     in use at exit: 3,115,507 bytes in 69,011 blocks
==10006==   total heap usage: 1,592,300 allocs, 1,523,289 frees, 128,627,859 bytes allocated
==10006== 
--10005-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10005== 
==10005== HEAP SUMMARY:
==10005==     in use at exit: 3,124,100 bytes in 69,156 blocks
==10005==   total heap usage: 1,592,638 allocs, 1,523,482 frees, 128,548,060 bytes allocated
==10005== 
==10006== Searching for pointers to 69,011 not-freed blocks
--10006--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10006--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10006--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10006--   Scanning root segment: 0x4037000..0x403afff (16384)
--10006--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10006--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10006--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10006--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10006--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10006--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10006--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10006--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10006--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10006--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10006--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10006--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10006--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10006--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10006--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10006--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10006--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10006--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10006--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10006--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10006--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10006--   Scanning root segment: 0x701a000..0x701afff (4096)
--10006--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10006--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10006--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10006--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10006--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10006--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10006--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10006--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10006--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10006--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10005== Searching for pointers to 69,156 not-freed blocks
--10005--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10005--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10005--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10005--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10005--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10005--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10005--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10005--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10005--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10005--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10005--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10005--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10005--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10005--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10005--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10005--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10005--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10005--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10005--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10005--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10005--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10005--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10005--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10005--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10005--   Scanning root segment: 0x701a000..0x701afff (4096)
--10005--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10005--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10005--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10005--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10005--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10005--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10005--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10005--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10005--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10005--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10006== Checked 4,791,232 bytes
==10006== 
==10006== LEAK SUMMARY:
==10006==    definitely lost: 2,189 bytes in 12 blocks
==10006==    indirectly lost: 6,756 bytes in 7 blocks
==10006==      possibly lost: 0 bytes in 0 blocks
==10006==    still reachable: 3,106,562 bytes in 68,992 blocks
==10006==         suppressed: 0 bytes in 0 blocks
==10006== Rerun with --leak-check=full to see details of leaked memory
==10006== 
==10006== Use --track-origins=yes to see where uninitialised values come from
==10006== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10006== 
==10006== 1 errors in context 1 of 2:
==10006== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10006==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10006==    by 0x488CD0: stringsubst (subst.c:301)
==10006==    by 0x48801B: prefork (subst.c:77)
==10006==    by 0x42B318: execcmd (exec.c:2619)
==10006==    by 0x428CA0: execpline2 (exec.c:1697)
==10006==    by 0x427FD2: execpline (exec.c:1484)
==10006==    by 0x427756: execlist (exec.c:1267)
==10006==    by 0x42717C: execode (exec.c:1073)
==10006==    by 0x431299: runshfunc (exec.c:5040)
==10006==    by 0x430E76: doshfunc (exec.c:4920)
==10006==    by 0x4302FB: execshfunc (exec.c:4557)
==10006==    by 0x42D8C1: execcmd (exec.c:3373)
==10006== 
==10006== 
==10006== 2 errors in context 2 of 2:
==10006== Conditional jump or move depends on uninitialised value(s)
==10006==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10006==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10006==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10006==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10006==    by 0x42D8E9: execcmd (exec.c:3378)
==10006==    by 0x428CA0: execpline2 (exec.c:1697)
==10006==    by 0x427FD2: execpline (exec.c:1484)
==10006==    by 0x42779A: execlist (exec.c:1275)
==10006==    by 0x42717C: execode (exec.c:1073)
==10006==    by 0x431299: runshfunc (exec.c:5040)
==10006==    by 0x430E76: doshfunc (exec.c:4920)
==10006==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10006== 
==10006== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10004-- Caught __NR_exit; running __libc_freeres()
==10005== Checked 4,784,008 bytes
==10005== 
==10005== LEAK SUMMARY:
==10005==    definitely lost: 2,189 bytes in 12 blocks
==10005==    indirectly lost: 6,756 bytes in 7 blocks
==10005==      possibly lost: 0 bytes in 0 blocks
==10005==    still reachable: 3,115,155 bytes in 69,137 blocks
==10005==         suppressed: 0 bytes in 0 blocks
==10005== Rerun with --leak-check=full to see details of leaked memory
==10005== 
==10005== Use --track-origins=yes to see where uninitialised values come from
==10005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10005== 
==10005== 1 errors in context 1 of 2:
==10005== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10005==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10005==    by 0x488CD0: stringsubst (subst.c:301)
==10005==    by 0x48801B: prefork (subst.c:77)
==10005==    by 0x42B318: execcmd (exec.c:2619)
==10005==    by 0x428CA0: execpline2 (exec.c:1697)
==10005==    by 0x427FD2: execpline (exec.c:1484)
==10005==    by 0x427756: execlist (exec.c:1267)
==10005==    by 0x42717C: execode (exec.c:1073)
==10005==    by 0x431299: runshfunc (exec.c:5040)
==10005==    by 0x430E76: doshfunc (exec.c:4920)
==10005==    by 0x4302FB: execshfunc (exec.c:4557)
==10005==    by 0x42D8C1: execcmd (exec.c:3373)
==10005== 
==10005== 
==10005== 2 errors in context 2 of 2:
==10005== Conditional jump or move depends on uninitialised value(s)
==10005==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10005==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10005==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10005==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10005==    by 0x42D8E9: execcmd (exec.c:3378)
==10005==    by 0x428CA0: execpline2 (exec.c:1697)
==10005==    by 0x427FD2: execpline (exec.c:1484)
==10005==    by 0x42779A: execlist (exec.c:1275)
==10005==    by 0x42717C: execode (exec.c:1073)
==10005==    by 0x431299: runshfunc (exec.c:5040)
==10005==    by 0x430E76: doshfunc (exec.c:4920)
==10005==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10005== 
==10005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10004-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10004== 
==10004== HEAP SUMMARY:
==10004==     in use at exit: 3,115,283 bytes in 69,008 blocks
==10004==   total heap usage: 1,592,303 allocs, 1,523,295 frees, 128,628,435 bytes allocated
==10004== 
==10008== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10008-by-pythonnut-on-???
==10008== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10008-by-pythonnut-on-???
==10008== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10008-by-pythonnut-on-???
==10008== 
==10008== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10008== don't want to do, unless you know exactly what you're doing,
==10008== or are doing some strange experiment):
==10008==   /usr/lib/valgrind/../../bin/vgdb --pid=10008 ...command...
==10008== 
==10008== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10008==   /path/to/gdb ./zsh
==10008== and then give GDB the following command
==10008==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10008
==10008== --pid is optional if only one valgrind process is running
==10008== 
==10004== Searching for pointers to 69,008 not-freed blocks
--10004--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10004--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10004--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10004--   Scanning root segment: 0x4037000..0x403afff (16384)
--10004--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10004--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10004--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10004--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10004--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10004--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10004--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10004--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10004--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10004--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10004--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10004--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10004--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10004--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10004--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10004--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10004--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10004--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10004--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10004--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10004--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10004--   Scanning root segment: 0x701a000..0x701afff (4096)
--10004--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10004--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10004--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10004--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10004--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10004--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10004--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10004--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10004--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10004--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10008-- Caught __NR_exit; running __libc_freeres()
--10008-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10008== 
==10008== HEAP SUMMARY:
==10008==     in use at exit: 3,124,129 bytes in 69,157 blocks
==10008==   total heap usage: 1,592,651 allocs, 1,523,494 frees, 128,550,748 bytes allocated
==10008== 
==10008== Searching for pointers to 69,157 not-freed blocks
--10008--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10008--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10008--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10008--   Scanning root segment: 0x4037000..0x403afff (16384)
--10008--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10008--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10008--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10008--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10008--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10008--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10008--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10008--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10008--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10008--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10008--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10008--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10008--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10008--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10008--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10008--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10008--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10008--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10008--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10008--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10008--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10008--   Scanning root segment: 0x701a000..0x701afff (4096)
--10008--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10008--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10008--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10008--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10008--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10008--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10008--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10008--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10008--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10008--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10004== Checked 4,790,376 bytes
==10004== 
==10004== LEAK SUMMARY:
==10004==    definitely lost: 2,189 bytes in 12 blocks
==10004==    indirectly lost: 6,756 bytes in 7 blocks
==10004==      possibly lost: 0 bytes in 0 blocks
==10004==    still reachable: 3,106,338 bytes in 68,989 blocks
==10004==         suppressed: 0 bytes in 0 blocks
==10004== Rerun with --leak-check=full to see details of leaked memory
==10004== 
==10004== Use --track-origins=yes to see where uninitialised values come from
==10004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10004== 
==10004== 1 errors in context 1 of 2:
==10004== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10004==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10004==    by 0x488CD0: stringsubst (subst.c:301)
==10004==    by 0x48801B: prefork (subst.c:77)
==10004==    by 0x42B318: execcmd (exec.c:2619)
==10004==    by 0x428CA0: execpline2 (exec.c:1697)
==10004==    by 0x427FD2: execpline (exec.c:1484)
==10004==    by 0x427756: execlist (exec.c:1267)
==10004==    by 0x42717C: execode (exec.c:1073)
==10004==    by 0x431299: runshfunc (exec.c:5040)
==10004==    by 0x430E76: doshfunc (exec.c:4920)
==10004==    by 0x4302FB: execshfunc (exec.c:4557)
==10004==    by 0x42D8C1: execcmd (exec.c:3373)
==10004== 
==10004== 
==10004== 2 errors in context 2 of 2:
==10004== Conditional jump or move depends on uninitialised value(s)
==10004==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10004==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10004==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10004==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10004==    by 0x42D8E9: execcmd (exec.c:3378)
==10004==    by 0x428CA0: execpline2 (exec.c:1697)
==10004==    by 0x427FD2: execpline (exec.c:1484)
==10004==    by 0x42779A: execlist (exec.c:1275)
==10004==    by 0x42717C: execode (exec.c:1073)
==10004==    by 0x431299: runshfunc (exec.c:5040)
==10004==    by 0x430E76: doshfunc (exec.c:4920)
==10004==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10004== 
==10004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9906-- Caught __NR_exit; running __libc_freeres()
--9906-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9906== 
==9906== HEAP SUMMARY:
==9906==     in use at exit: 3,112,789 bytes in 68,931 blocks
==9906==   total heap usage: 1,592,302 allocs, 1,523,371 frees, 128,630,225 bytes allocated
==9906== 
==10008== Checked 4,799,904 bytes
==10008== 
==9906== Searching for pointers to 68,931 not-freed blocks
--9906--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9906--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9906--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9906--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9906--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9906--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9906--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9906--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9906--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9906--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9906--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9906--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9906--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9906--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9906--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9906--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9906--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9906--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9906--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9906--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9906--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9906--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9906--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9906--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9906--   Scanning root segment: 0x701a000..0x701afff (4096)
--9906--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9906--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9906--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9906--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9906--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9906--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9906--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9906--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9906--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9906--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10008== LEAK SUMMARY:
==10008==    definitely lost: 2,189 bytes in 12 blocks
==10008==    indirectly lost: 6,756 bytes in 7 blocks
==10008==      possibly lost: 0 bytes in 0 blocks
==10008==    still reachable: 3,115,184 bytes in 69,138 blocks
==10008==         suppressed: 0 bytes in 0 blocks
==10008== Rerun with --leak-check=full to see details of leaked memory
==10008== 
==10008== Use --track-origins=yes to see where uninitialised values come from
==10008== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10008== 
==10008== 1 errors in context 1 of 2:
==10008== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10008==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10008==    by 0x488CD0: stringsubst (subst.c:301)
==10008==    by 0x48801B: prefork (subst.c:77)
==10008==    by 0x42B318: execcmd (exec.c:2619)
==10008==    by 0x428CA0: execpline2 (exec.c:1697)
==10008==    by 0x427FD2: execpline (exec.c:1484)
==10008==    by 0x427756: execlist (exec.c:1267)
==10008==    by 0x42717C: execode (exec.c:1073)
==10008==    by 0x431299: runshfunc (exec.c:5040)
==10008==    by 0x430E76: doshfunc (exec.c:4920)
==10008==    by 0x4302FB: execshfunc (exec.c:4557)
==10008==    by 0x42D8C1: execcmd (exec.c:3373)
==10008== 
==10008== 
==10008== 2 errors in context 2 of 2:
==10008== Conditional jump or move depends on uninitialised value(s)
==10008==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10008==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10008==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10008==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10008==    by 0x42D8E9: execcmd (exec.c:3378)
==10008==    by 0x428CA0: execpline2 (exec.c:1697)
==10008==    by 0x427FD2: execpline (exec.c:1484)
==10008==    by 0x42779A: execlist (exec.c:1275)
==10008==    by 0x42717C: execode (exec.c:1073)
==10008==    by 0x431299: runshfunc (exec.c:5040)
==10008==    by 0x430E76: doshfunc (exec.c:4920)
==10008==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10008== 
==10008== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10009-by-pythonnut-on-???
==10009== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10009-by-pythonnut-on-???
==10009== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10009-by-pythonnut-on-???
==10009== 
==10009== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10009== don't want to do, unless you know exactly what you're doing,
==10009== or are doing some strange experiment):
==10009==   /usr/lib/valgrind/../../bin/vgdb --pid=10009 ...command...
==10009== 
==10009== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10009==   /path/to/gdb ./zsh
==10009== and then give GDB the following command
==10009==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10009
==10009== --pid is optional if only one valgrind process is running
==10009== 
==10010== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10010-by-pythonnut-on-???
==10010== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10010-by-pythonnut-on-???
==10010== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10010-by-pythonnut-on-???
==10010== 
==10010== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10010== don't want to do, unless you know exactly what you're doing,
==10010== or are doing some strange experiment):
==10010==   /usr/lib/valgrind/../../bin/vgdb --pid=10010 ...command...
==10010== 
==10010== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10010==   /path/to/gdb ./zsh
==10010== and then give GDB the following command
==10010==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10010
==10010== --pid is optional if only one valgrind process is running
==10010== 
==9906== Checked 4,768,520 bytes
==9906== 
--10011-- Caught __NR_exit; running __libc_freeres()
--10009-- Caught __NR_exit; running __libc_freeres()
==9906== LEAK SUMMARY:
==9906==    definitely lost: 2,189 bytes in 12 blocks
==9906==    indirectly lost: 6,756 bytes in 7 blocks
==9906==      possibly lost: 0 bytes in 0 blocks
==9906==    still reachable: 3,103,844 bytes in 68,912 blocks
==9906==         suppressed: 0 bytes in 0 blocks
==9906== Rerun with --leak-check=full to see details of leaked memory
==9906== 
==9906== Use --track-origins=yes to see where uninitialised values come from
==9906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9906== 
==9906== 1 errors in context 1 of 2:
==9906== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9906==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9906==    by 0x488CD0: stringsubst (subst.c:301)
==9906==    by 0x48801B: prefork (subst.c:77)
==9906==    by 0x42B318: execcmd (exec.c:2619)
==9906==    by 0x428CA0: execpline2 (exec.c:1697)
==9906==    by 0x427FD2: execpline (exec.c:1484)
==9906==    by 0x427756: execlist (exec.c:1267)
==9906==    by 0x42717C: execode (exec.c:1073)
==9906==    by 0x431299: runshfunc (exec.c:5040)
==9906==    by 0x430E76: doshfunc (exec.c:4920)
==9906==    by 0x4302FB: execshfunc (exec.c:4557)
==9906==    by 0x42D8C1: execcmd (exec.c:3373)
==9906== 
==9906== 
==9906== 2 errors in context 2 of 2:
==9906== Conditional jump or move depends on uninitialised value(s)
==9906==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9906==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9906==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9906==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9906==    by 0x42D8E9: execcmd (exec.c:3378)
==9906==    by 0x428CA0: execpline2 (exec.c:1697)
==9906==    by 0x427FD2: execpline (exec.c:1484)
==9906==    by 0x42779A: execlist (exec.c:1275)
==9906==    by 0x42717C: execode (exec.c:1073)
==9906==    by 0x431299: runshfunc (exec.c:5040)
==9906==    by 0x430E76: doshfunc (exec.c:4920)
==9906==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9906== 
==9906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10011== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10011-by-pythonnut-on-???
==10011== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10011-by-pythonnut-on-???
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==10011== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10011-by-pythonnut-on-???
==10011== 
==10011== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10011== don't want to do, unless you know exactly what you're doing,
==10011== or are doing some strange experiment):
==10011==   /usr/lib/valgrind/../../bin/vgdb --pid=10011 ...command...
==10011== 
==10011== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10011==   /path/to/gdb ./zsh
==10011== and then give GDB the following command
==10011==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10011
==10011== --pid is optional if only one valgrind process is running
==10011== 
--10011-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10013== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10013-by-pythonnut-on-???
==10013== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10013-by-pythonnut-on-???
==10013== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10013-by-pythonnut-on-???
==10013== 
==10013== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10013== don't want to do, unless you know exactly what you're doing,
==10013== or are doing some strange experiment):
==10013==   /usr/lib/valgrind/../../bin/vgdb --pid=10013 ...command...
==10013== 
==10013== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10013==   /path/to/gdb ./zsh
==10013== and then give GDB the following command
==10013==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10013
==10013== --pid is optional if only one valgrind process is running
==10013== 
--10009-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10011== 
==10011== HEAP SUMMARY:
==10011==     in use at exit: 3,124,601 bytes in 69,169 blocks
==10011==   total heap usage: 1,594,304 allocs, 1,525,135 frees, 128,640,509 bytes allocated
==10011== 
==10009== 
==10015== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10015-by-pythonnut-on-???
==10015== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10015-by-pythonnut-on-???
==10015== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10015-by-pythonnut-on-???
==10015== 
==10015== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10015== don't want to do, unless you know exactly what you're doing,
==10015== or are doing some strange experiment):
==10015==   /usr/lib/valgrind/../../bin/vgdb --pid=10015 ...command...
==10015== 
==10015== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10015==   /path/to/gdb ./zsh
==10015== and then give GDB the following command
==10015==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10015
==10015== --pid is optional if only one valgrind process is running
==10015== 
==10009== HEAP SUMMARY:
==10009==     in use at exit: 3,153,741 bytes in 69,133 blocks
==10009==   total heap usage: 1,592,204 allocs, 1,523,071 frees, 128,618,029 bytes allocated
==10009== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==10014== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10014-by-pythonnut-on-???
==10014== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10014-by-pythonnut-on-???
==10014== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10014-by-pythonnut-on-???
==10014== 
==10014== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10014== don't want to do, unless you know exactly what you're doing,
==10014== or are doing some strange experiment):
==10014==   /usr/lib/valgrind/../../bin/vgdb --pid=10014 ...command...
==10014== 
==10014== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10014==   /path/to/gdb ./zsh
==10014== and then give GDB the following command
==10014==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10014
==10014== --pid is optional if only one valgrind process is running
==10014== 
--10014-- Caught __NR_exit; running __libc_freeres()
==10011== Searching for pointers to 69,169 not-freed blocks
--10011--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10011--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10011--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10011--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10011--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10011--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10011--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10011--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10011--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10011--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10011--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10011--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10011--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10011--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10011--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10011--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10011--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10011--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10011--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10011--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10011--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10011--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10011--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10011--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10011--   Scanning root segment: 0x701a000..0x701afff (4096)
--10011--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10011--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10011--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10011--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10011--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10011--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10011--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10011--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10011--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10011--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10009== Searching for pointers to 69,133 not-freed blocks
--10009--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10009--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10009--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10009--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10009--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10009--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10009--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10009--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10009--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10009--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10009--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10009--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10009--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10009--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10009--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10009--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10009--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10009--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10009--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10009--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10009--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10009--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10009--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10009--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10009--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10009--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10009--   Scanning root segment: 0x701a000..0x701afff (4096)
--10009--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10009--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10009--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10009--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10009--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10009--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10009--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10009--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10009--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10009--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10009--   Scanning root segment: 0xbe86000..0xbe99fff (81920)
--10009--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10014-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10014== 
==10014== HEAP SUMMARY:
==10014==     in use at exit: 3,113,357 bytes in 68,943 blocks
==10014==   total heap usage: 1,592,129 allocs, 1,523,186 frees, 128,585,032 bytes allocated
==10014== 
==10014== Searching for pointers to 68,943 not-freed blocks
--10014--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10014--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10014--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10014--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10014--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10014--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10014--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10014--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10014--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10014--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10014--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10014--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10014--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10014--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10014--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10014--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10014--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10014--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10014--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10014--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10014--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10014--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10014--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10014--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10014--   Scanning root segment: 0x701a000..0x701afff (4096)
--10014--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10014--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10014--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10014--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10014--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10014--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10014--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10014--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10014--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10014--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10011== Checked 4,785,832 bytes
==10011== 
==10011== LEAK SUMMARY:
==10011==    definitely lost: 2,197 bytes in 13 blocks
==10011==    indirectly lost: 6,756 bytes in 7 blocks
==10011==      possibly lost: 0 bytes in 0 blocks
==10011==    still reachable: 3,115,648 bytes in 69,149 blocks
==10011==         suppressed: 0 bytes in 0 blocks
==10011== Rerun with --leak-check=full to see details of leaked memory
==10011== 
==10011== Use --track-origins=yes to see where uninitialised values come from
==10011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10011== 
==10011== 1 errors in context 1 of 2:
==10011== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10011==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10011==    by 0x488CD0: stringsubst (subst.c:301)
==10011==    by 0x48801B: prefork (subst.c:77)
==10011==    by 0x42B318: execcmd (exec.c:2619)
==10011==    by 0x428CA0: execpline2 (exec.c:1697)
==10011==    by 0x427FD2: execpline (exec.c:1484)
==10011==    by 0x427756: execlist (exec.c:1267)
==10011==    by 0x42717C: execode (exec.c:1073)
==10011==    by 0x431299: runshfunc (exec.c:5040)
==10011==    by 0x430E76: doshfunc (exec.c:4920)
==10011==    by 0x4302FB: execshfunc (exec.c:4557)
==10011==    by 0x42D8C1: execcmd (exec.c:3373)
==10011== 
==10011== 
==10011== 2 errors in context 2 of 2:
==10011== Conditional jump or move depends on uninitialised value(s)
==10011==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10011==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10011==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10011==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10011==    by 0x42D8E9: execcmd (exec.c:3378)
==10011==    by 0x428CA0: execpline2 (exec.c:1697)
==10011==    by 0x427FD2: execpline (exec.c:1484)
==10011==    by 0x42779A: execlist (exec.c:1275)
==10011==    by 0x42717C: execode (exec.c:1073)
==10011==    by 0x431299: runshfunc (exec.c:5040)
==10011==    by 0x430E76: doshfunc (exec.c:4920)
==10011==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10011== 
==10011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== Checked 5,386,464 bytes
==10009== 
--10010-- Caught __NR_exit; running __libc_freeres()
==10009== LEAK SUMMARY:
==10009==    definitely lost: 2,189 bytes in 12 blocks
==10009==    indirectly lost: 6,756 bytes in 7 blocks
==10009==      possibly lost: 0 bytes in 0 blocks
==10009==    still reachable: 3,144,796 bytes in 69,114 blocks
==10009==         suppressed: 0 bytes in 0 blocks
==10009== Rerun with --leak-check=full to see details of leaked memory
==10009== 
==10009== Use --track-origins=yes to see where uninitialised values come from
==10009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== 
==10009== 1 errors in context 1 of 2:
==10009== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10009==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10009==    by 0x488CD0: stringsubst (subst.c:301)
==10009==    by 0x48801B: prefork (subst.c:77)
==10009==    by 0x42B318: execcmd (exec.c:2619)
==10009==    by 0x428CA0: execpline2 (exec.c:1697)
==10009==    by 0x427FD2: execpline (exec.c:1484)
==10009==    by 0x427756: execlist (exec.c:1267)
==10009==    by 0x42717C: execode (exec.c:1073)
==10009==    by 0x431299: runshfunc (exec.c:5040)
==10009==    by 0x430E76: doshfunc (exec.c:4920)
==10009==    by 0x4302FB: execshfunc (exec.c:4557)
==10009==    by 0x42D8C1: execcmd (exec.c:3373)
==10009== 
==10009== 
==10009== 2 errors in context 2 of 2:
==10009== Conditional jump or move depends on uninitialised value(s)
==10009==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10009==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10009==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10009==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10009==    by 0x42D8E9: execcmd (exec.c:3378)
==10009==    by 0x428CA0: execpline2 (exec.c:1697)
==10009==    by 0x427FD2: execpline (exec.c:1484)
==10009==    by 0x42779A: execlist (exec.c:1275)
==10009==    by 0x42717C: execode (exec.c:1073)
==10009==    by 0x431299: runshfunc (exec.c:5040)
==10009==    by 0x430E76: doshfunc (exec.c:4920)
==10009==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10009== 
==10009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10010-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10014== Checked 4,771,136 bytes
==10010== 
==10014== 
==10010== HEAP SUMMARY:
==10010==     in use at exit: 3,124,537 bytes in 69,166 blocks
==10010==   total heap usage: 1,594,302 allocs, 1,525,136 frees, 128,640,268 bytes allocated
==10010== 
--10016-- Caught __NR_exit; running __libc_freeres()
==10016== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10016-by-pythonnut-on-???
==10016== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10016-by-pythonnut-on-???
==10016== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10016-by-pythonnut-on-???
==10016== 
==10016== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10016== don't want to do, unless you know exactly what you're doing,
==10016== or are doing some strange experiment):
==10016==   /usr/lib/valgrind/../../bin/vgdb --pid=10016 ...command...
==10016== 
==10016== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10016==   /path/to/gdb ./zsh
==10016== and then give GDB the following command
==10016==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10016
==10016== --pid is optional if only one valgrind process is running
==10016== 
==10014== LEAK SUMMARY:
==10014==    definitely lost: 2,189 bytes in 12 blocks
==10014==    indirectly lost: 6,756 bytes in 7 blocks
==10014==      possibly lost: 0 bytes in 0 blocks
==10014==    still reachable: 3,104,412 bytes in 68,924 blocks
==10014==         suppressed: 0 bytes in 0 blocks
==10014== Rerun with --leak-check=full to see details of leaked memory
==10014== 
==10014== Use --track-origins=yes to see where uninitialised values come from
==10014== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10014== 
==10014== 1 errors in context 1 of 2:
==10014== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10014==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10014==    by 0x488CD0: stringsubst (subst.c:301)
==10014==    by 0x48801B: prefork (subst.c:77)
==10014==    by 0x42B318: execcmd (exec.c:2619)
==10014==    by 0x428CA0: execpline2 (exec.c:1697)
==10014==    by 0x427FD2: execpline (exec.c:1484)
==10014==    by 0x427756: execlist (exec.c:1267)
==10014==    by 0x42717C: execode (exec.c:1073)
==10014==    by 0x431299: runshfunc (exec.c:5040)
==10014==    by 0x430E76: doshfunc (exec.c:4920)
==10014==    by 0x4302FB: execshfunc (exec.c:4557)
==10014==    by 0x42D8C1: execcmd (exec.c:3373)
==10014== 
==10014== 
==10014== 2 errors in context 2 of 2:
==10014== Conditional jump or move depends on uninitialised value(s)
==10014==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10014==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10014==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10014==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10014==    by 0x42D8E9: execcmd (exec.c:3378)
==10014==    by 0x428CA0: execpline2 (exec.c:1697)
==10014==    by 0x427FD2: execpline (exec.c:1484)
==10014==    by 0x42779A: execlist (exec.c:1275)
==10014==    by 0x42717C: execode (exec.c:1073)
==10014==    by 0x431299: runshfunc (exec.c:5040)
==10014==    by 0x430E76: doshfunc (exec.c:4920)
==10014==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10014== 
==10014== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10016-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10010== Searching for pointers to 69,166 not-freed blocks
--10010--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10010--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10010--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10010--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10010--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10010--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10010--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10010--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10010--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10010--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10010--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10010--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10010--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10010--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10010--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10010--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10010--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10010--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10010--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10010--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10010--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10010--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10010--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10010--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10010--   Scanning root segment: 0x701a000..0x701afff (4096)
--10010--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10010--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10010--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10010--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10010--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10010--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10010--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10010--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10010--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10010--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10016== 
==10016== HEAP SUMMARY:
==10016==     in use at exit: 3,144,080 bytes in 69,928 blocks
==10016==   total heap usage: 1,593,029 allocs, 1,523,101 frees, 128,633,903 bytes allocated
==10016== 
client request: code 4d430005,  addr 0xFFEFF2AEC,  len 4
==10016== Searching for pointers to 69,928 not-freed blocks
--10016--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10016--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10016--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10016--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10016--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10016--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10016--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10016--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10016--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10016--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10016--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10016--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10016--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10016--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10016--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10016--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10016--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10016--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10016--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10016--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10016--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10016--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10016--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10016--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10016--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10016--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10016--   Scanning root segment: 0x701a000..0x701afff (4096)
--10016--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10016--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10016--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10016--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10016--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10016--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10016--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10016--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10016--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10016--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10016--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10016--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10010== Checked 4,785,144 bytes
==10010== 
==10010== LEAK SUMMARY:
==10010==    definitely lost: 2,197 bytes in 13 blocks
==10010==    indirectly lost: 6,756 bytes in 7 blocks
==10010==      possibly lost: 0 bytes in 0 blocks
==10010==    still reachable: 3,115,584 bytes in 69,146 blocks
==10010==         suppressed: 0 bytes in 0 blocks
==10010== Rerun with --leak-check=full to see details of leaked memory
==10010== 
==10010== Use --track-origins=yes to see where uninitialised values come from
==10010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10010== 
==10010== 1 errors in context 1 of 2:
==10010== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10010==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10010==    by 0x488CD0: stringsubst (subst.c:301)
==10010==    by 0x48801B: prefork (subst.c:77)
==10010==    by 0x42B318: execcmd (exec.c:2619)
==10010==    by 0x428CA0: execpline2 (exec.c:1697)
==10010==    by 0x427FD2: execpline (exec.c:1484)
==10010==    by 0x427756: execlist (exec.c:1267)
==10010==    by 0x42717C: execode (exec.c:1073)
==10010==    by 0x431299: runshfunc (exec.c:5040)
==10010==    by 0x430E76: doshfunc (exec.c:4920)
==10010==    by 0x4302FB: execshfunc (exec.c:4557)
==10010==    by 0x42D8C1: execcmd (exec.c:3373)
==10010== 
==10010== 
==10010== 2 errors in context 2 of 2:
==10010== Conditional jump or move depends on uninitialised value(s)
==10010==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10010==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10010==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10010==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10010==    by 0x42D8E9: execcmd (exec.c:3378)
==10010==    by 0x428CA0: execpline2 (exec.c:1697)
==10010==    by 0x427FD2: execpline (exec.c:1484)
==10010==    by 0x42779A: execlist (exec.c:1275)
==10010==    by 0x42717C: execode (exec.c:1073)
==10010==    by 0x431299: runshfunc (exec.c:5040)
==10010==    by 0x430E76: doshfunc (exec.c:4920)
==10010==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10010== 
==10010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10016== Checked 5,700,080 bytes
==10016== 
--10017-- Caught __NR_exit; running __libc_freeres()
--10065-- Caught __NR_exit; running __libc_freeres()
==10065== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10065-by-pythonnut-on-???
==10065== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10065-by-pythonnut-on-???
==10065== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10065-by-pythonnut-on-???
==10065== 
==10065== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10065== don't want to do, unless you know exactly what you're doing,
==10065== or are doing some strange experiment):
==10065==   /usr/lib/valgrind/../../bin/vgdb --pid=10065 ...command...
==10065== 
==10065== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10065==   /path/to/gdb ./zsh
==10065== and then give GDB the following command
==10065==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10065
==10065== --pid is optional if only one valgrind process is running
==10065== 
==10017== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10017-by-pythonnut-on-???
==10017== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10017-by-pythonnut-on-???
==10017== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10017-by-pythonnut-on-???
==10017== 
==10017== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10017== don't want to do, unless you know exactly what you're doing,
==10017== or are doing some strange experiment):
==10017==   /usr/lib/valgrind/../../bin/vgdb --pid=10017 ...command...
==10017== 
==10017== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10017==   /path/to/gdb ./zsh
==10017== and then give GDB the following command
==10017==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10017
==10017== --pid is optional if only one valgrind process is running
==10017== 
==10016== LEAK SUMMARY:
==10016==    definitely lost: 2,189 bytes in 12 blocks
==10016==    indirectly lost: 6,756 bytes in 7 blocks
==10016==      possibly lost: 0 bytes in 0 blocks
==10016==    still reachable: 3,135,135 bytes in 69,909 blocks
==10016==         suppressed: 0 bytes in 0 blocks
==10016== Rerun with --leak-check=full to see details of leaked memory
==10016== 
==10016== Use --track-origins=yes to see where uninitialised values come from
==10016== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10016== 
==10016== 1 errors in context 1 of 2:
==10016== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10016==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10016==    by 0x488CD0: stringsubst (subst.c:301)
==10016==    by 0x48801B: prefork (subst.c:77)
==10016==    by 0x42B318: execcmd (exec.c:2619)
==10016==    by 0x428CA0: execpline2 (exec.c:1697)
==10016==    by 0x427FD2: execpline (exec.c:1484)
==10016==    by 0x427756: execlist (exec.c:1267)
==10016==    by 0x42717C: execode (exec.c:1073)
==10016==    by 0x431299: runshfunc (exec.c:5040)
==10016==    by 0x430E76: doshfunc (exec.c:4920)
==10016==    by 0x4302FB: execshfunc (exec.c:4557)
==10016==    by 0x42D8C1: execcmd (exec.c:3373)
==10016== 
==10016== 
==10016== 2 errors in context 2 of 2:
==10016== Conditional jump or move depends on uninitialised value(s)
==10016==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10016==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10016==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10016==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10016==    by 0x42D8E9: execcmd (exec.c:3378)
==10016==    by 0x428CA0: execpline2 (exec.c:1697)
==10016==    by 0x427FD2: execpline (exec.c:1484)
==10016==    by 0x42779A: execlist (exec.c:1275)
==10016==    by 0x42717C: execode (exec.c:1073)
==10016==    by 0x431299: runshfunc (exec.c:5040)
==10016==    by 0x430E76: doshfunc (exec.c:4920)
==10016==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10016== 
==10016== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10017-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10065-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10065== 
==10017== 
==10065== HEAP SUMMARY:
==10065==     in use at exit: 3,124,544 bytes in 69,166 blocks
==10065==   total heap usage: 1,594,317 allocs, 1,525,151 frees, 128,645,266 bytes allocated
==10065== 
==10017== HEAP SUMMARY:
==10017==     in use at exit: 3,113,716 bytes in 68,951 blocks
==10017==   total heap usage: 1,592,144 allocs, 1,523,193 frees, 128,589,047 bytes allocated
==10017== 
==10068== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10068-by-pythonnut-on-???
==10068== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10068-by-pythonnut-on-???
==10068== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10068-by-pythonnut-on-???
==10068== 
==10068== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10068== don't want to do, unless you know exactly what you're doing,
==10068== or are doing some strange experiment):
==10068==   /usr/lib/valgrind/../../bin/vgdb --pid=10068 ...command...
==10068== 
==10068== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10068==   /path/to/gdb ./zsh
==10068== and then give GDB the following command
==10068==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10068
==10068== --pid is optional if only one valgrind process is running
==10068== 
--10068-- Caught __NR_exit; running __libc_freeres()
==10065== Searching for pointers to 69,166 not-freed blocks
--10065--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10065--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10065--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10065--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10065--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10065--   Scanning root segment: 0x4223000..0x4223fff (4096)
==10017== Searching for pointers to 68,951 not-freed blocks
--10017--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10065--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10065--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10065--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10065--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10017--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10065--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10065--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10065--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10065--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10065--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10065--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10065--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10065--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10065--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10065--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10017--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10017--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10017--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10017--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10065--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10017--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10017--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10017--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10065--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10017--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10017--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10017--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10065--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10017--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10065--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10017--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10017--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10017--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10065--   Scanning root segment: 0x701a000..0x701afff (4096)
--10017--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10065--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10065--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10017--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10065--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10017--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10065--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10017--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10065--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10065--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10065--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10065--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10065--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10065--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10017--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10017--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10017--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10017--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10017--   Scanning root segment: 0x701a000..0x701afff (4096)
--10017--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10017--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10017--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10017--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10017--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10017--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10017--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10017--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10017--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10017--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10068-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10068== 
==10068== HEAP SUMMARY:
==10068==     in use at exit: 3,144,192 bytes in 69,929 blocks
==10068==   total heap usage: 1,593,047 allocs, 1,523,118 frees, 128,638,745 bytes allocated
==10068== 
==10068== Searching for pointers to 69,929 not-freed blocks
--10068--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10068--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10068--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10068--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10068--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10068--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10068--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10068--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10068--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10068--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10068--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10068--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10068--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10068--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10068--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10068--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10068--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10068--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10068--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10068--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10068--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10068--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10068--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10068--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10068--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10068--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10068--   Scanning root segment: 0x701a000..0x701afff (4096)
--10068--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10068--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10068--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10068--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10068--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10068--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10068--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10068--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10068--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10068--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10068--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10068--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10065== Checked 4,785,280 bytes
==10065== 
==10017== Checked 4,771,200 bytes
==10017== 
==10065== LEAK SUMMARY:
==10065==    definitely lost: 2,197 bytes in 13 blocks
==10065==    indirectly lost: 6,756 bytes in 7 blocks
==10065==      possibly lost: 0 bytes in 0 blocks
==10065==    still reachable: 3,115,591 bytes in 69,146 blocks
==10065==         suppressed: 0 bytes in 0 blocks
==10065== Rerun with --leak-check=full to see details of leaked memory
==10065== 
==10065== Use --track-origins=yes to see where uninitialised values come from
==10065== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10065== 
==10065== 1 errors in context 1 of 2:
==10065== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10065==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10065==    by 0x488CD0: stringsubst (subst.c:301)
==10065==    by 0x48801B: prefork (subst.c:77)
==10065==    by 0x42B318: execcmd (exec.c:2619)
==10065==    by 0x428CA0: execpline2 (exec.c:1697)
==10065==    by 0x427FD2: execpline (exec.c:1484)
==10065==    by 0x427756: execlist (exec.c:1267)
==10065==    by 0x42717C: execode (exec.c:1073)
==10065==    by 0x431299: runshfunc (exec.c:5040)
==10065==    by 0x430E76: doshfunc (exec.c:4920)
==10065==    by 0x4302FB: execshfunc (exec.c:4557)
==10065==    by 0x42D8C1: execcmd (exec.c:3373)
==10065== 
==10065== 
==10065== 2 errors in context 2 of 2:
==10065== Conditional jump or move depends on uninitialised value(s)
==10065==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10065==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10065==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10065==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10065==    by 0x42D8E9: execcmd (exec.c:3378)
==10065==    by 0x428CA0: execpline2 (exec.c:1697)
==10065==    by 0x427FD2: execpline (exec.c:1484)
==10065==    by 0x42779A: execlist (exec.c:1275)
==10065==    by 0x42717C: execode (exec.c:1073)
==10065==    by 0x431299: runshfunc (exec.c:5040)
==10065==    by 0x430E76: doshfunc (exec.c:4920)
==10065==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10065== 
==10065== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10017== LEAK SUMMARY:
==10017==    definitely lost: 2,189 bytes in 12 blocks
==10017==    indirectly lost: 6,756 bytes in 7 blocks
==10017==      possibly lost: 0 bytes in 0 blocks
==10017==    still reachable: 3,104,771 bytes in 68,932 blocks
==10017==         suppressed: 0 bytes in 0 blocks
==10017== Rerun with --leak-check=full to see details of leaked memory
==10017== 
==10017== Use --track-origins=yes to see where uninitialised values come from
==10017== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10017== 
==10017== 1 errors in context 1 of 2:
==10017== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10017==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10017==    by 0x488CD0: stringsubst (subst.c:301)
==10017==    by 0x48801B: prefork (subst.c:77)
==10017==    by 0x42B318: execcmd (exec.c:2619)
==10017==    by 0x428CA0: execpline2 (exec.c:1697)
==10017==    by 0x427FD2: execpline (exec.c:1484)
==10017==    by 0x427756: execlist (exec.c:1267)
==10017==    by 0x42717C: execode (exec.c:1073)
==10017==    by 0x431299: runshfunc (exec.c:5040)
==10017==    by 0x430E76: doshfunc (exec.c:4920)
==10017==    by 0x4302FB: execshfunc (exec.c:4557)
==10017==    by 0x42D8C1: execcmd (exec.c:3373)
==10017== 
==10017== 
==10017== 2 errors in context 2 of 2:
==10017== Conditional jump or move depends on uninitialised value(s)
==10017==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10017==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10017==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10017==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10017==    by 0x42D8E9: execcmd (exec.c:3378)
==10017==    by 0x428CA0: execpline2 (exec.c:1697)
==10017==    by 0x427FD2: execpline (exec.c:1484)
==10017==    by 0x42779A: execlist (exec.c:1275)
==10017==    by 0x42717C: execode (exec.c:1073)
==10017==    by 0x431299: runshfunc (exec.c:5040)
==10017==    by 0x430E76: doshfunc (exec.c:4920)
==10017==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10017== 
==10017== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10013-- Caught __NR_exit; running __libc_freeres()
--10069-- Caught __NR_exit; running __libc_freeres()
==10068== Checked 5,700,184 bytes
==10068== 
--10013-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10069== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10069-by-pythonnut-on-???
==10069== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10069-by-pythonnut-on-???
==10069== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10069-by-pythonnut-on-???
==10069== 
==10069== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10069== don't want to do, unless you know exactly what you're doing,
==10069== or are doing some strange experiment):
==10069==   /usr/lib/valgrind/../../bin/vgdb --pid=10069 ...command...
==10069== 
==10069== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10069==   /path/to/gdb ./zsh
==10069== and then give GDB the following command
==10069==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10069
==10069== --pid is optional if only one valgrind process is running
==10069== 
==10013== 
==10013== HEAP SUMMARY:
==10013==     in use at exit: 3,112,854 bytes in 68,932 blocks
==10013==   total heap usage: 1,592,153 allocs, 1,523,221 frees, 128,591,050 bytes allocated
==10013== 
==10068== LEAK SUMMARY:
==10068==    definitely lost: 2,189 bytes in 12 blocks
==10068==    indirectly lost: 6,756 bytes in 7 blocks
==10068==      possibly lost: 0 bytes in 0 blocks
==10068==    still reachable: 3,135,247 bytes in 69,910 blocks
==10068==         suppressed: 0 bytes in 0 blocks
==10068== Rerun with --leak-check=full to see details of leaked memory
==10068== 
==10068== Use --track-origins=yes to see where uninitialised values come from
==10068== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10068== 
==10068== 1 errors in context 1 of 2:
==10068== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10068==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10068==    by 0x488CD0: stringsubst (subst.c:301)
==10068==    by 0x48801B: prefork (subst.c:77)
==10068==    by 0x42B318: execcmd (exec.c:2619)
==10068==    by 0x428CA0: execpline2 (exec.c:1697)
==10068==    by 0x427FD2: execpline (exec.c:1484)
==10068==    by 0x427756: execlist (exec.c:1267)
==10068==    by 0x42717C: execode (exec.c:1073)
==10068==    by 0x431299: runshfunc (exec.c:5040)
==10068==    by 0x430E76: doshfunc (exec.c:4920)
==10068==    by 0x4302FB: execshfunc (exec.c:4557)
==10068==    by 0x42D8C1: execcmd (exec.c:3373)
==10068== 
==10068== 
==10068== 2 errors in context 2 of 2:
==10068== Conditional jump or move depends on uninitialised value(s)
==10068==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10068==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10068==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10068==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10068==    by 0x42D8E9: execcmd (exec.c:3378)
==10068==    by 0x428CA0: execpline2 (exec.c:1697)
==10068==    by 0x427FD2: execpline (exec.c:1484)
==10068==    by 0x42779A: execlist (exec.c:1275)
==10068==    by 0x42717C: execode (exec.c:1073)
==10068==    by 0x431299: runshfunc (exec.c:5040)
==10068==    by 0x430E76: doshfunc (exec.c:4920)
==10068==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10068== 
==10068== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10069-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10069== 
==10069== HEAP SUMMARY:
==10069==     in use at exit: 3,124,640 bytes in 69,166 blocks
==10069==   total heap usage: 1,594,333 allocs, 1,525,167 frees, 128,650,053 bytes allocated
==10069== 
==10070== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10070-by-pythonnut-on-???
==10070== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10070-by-pythonnut-on-???
==10070== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10070-by-pythonnut-on-???
==10070== 
==10070== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10070== don't want to do, unless you know exactly what you're doing,
==10070== or are doing some strange experiment):
==10070==   /usr/lib/valgrind/../../bin/vgdb --pid=10070 ...command...
==10070== 
==10070== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10070==   /path/to/gdb ./zsh
==10070== and then give GDB the following command
==10070==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10070
==10070== --pid is optional if only one valgrind process is running
==10070== 
==10013== Searching for pointers to 68,932 not-freed blocks
--10013--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10013--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10013--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10013--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10013--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10013--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10013--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10013--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10013--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10013--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10013--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10013--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10013--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10013--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10013--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10013--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10013--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10013--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10013--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10070-- Caught __NR_exit; running __libc_freeres()
--10013--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10013--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10013--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10013--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10013--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10013--   Scanning root segment: 0x701a000..0x701afff (4096)
--10013--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10013--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10013--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10013--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10013--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10013--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10013--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10013--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10013--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10013--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10069== Searching for pointers to 69,166 not-freed blocks
--10069--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10069--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10069--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10069--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10069--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10069--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10069--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10069--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10069--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10069--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10069--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10069--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10069--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10069--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10069--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10069--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10069--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10069--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10069--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10069--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10069--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10069--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10069--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10069--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10069--   Scanning root segment: 0x701a000..0x701afff (4096)
--10069--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10069--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10069--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10069--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10069--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10069--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10069--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10069--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10069--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10069--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10070-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10070== 
==10070== HEAP SUMMARY:
==10070==     in use at exit: 3,144,192 bytes in 69,929 blocks
==10070==   total heap usage: 1,593,062 allocs, 1,523,133 frees, 128,643,454 bytes allocated
==10070== 
==10070== Searching for pointers to 69,929 not-freed blocks
--10070--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10070--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10070--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10070--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10070--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10070--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10070--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10070--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10070--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10070--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10070--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10070--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10070--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10070--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10070--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10070--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10070--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10070--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10070--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10070--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10070--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10070--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10070--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10070--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10070--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10070--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10070--   Scanning root segment: 0x701a000..0x701afff (4096)
--10070--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10070--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10070--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10070--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10070--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10070--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10070--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10070--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10070--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10070--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10070--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10070--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10013== Checked 4,768,584 bytes
==10013== 
==10069== Checked 4,784,560 bytes
==10069== 
==10013== LEAK SUMMARY:
==10013==    definitely lost: 2,189 bytes in 12 blocks
==10013==    indirectly lost: 6,756 bytes in 7 blocks
==10013==      possibly lost: 0 bytes in 0 blocks
==10013==    still reachable: 3,103,909 bytes in 68,913 blocks
==10013==         suppressed: 0 bytes in 0 blocks
==10013== Rerun with --leak-check=full to see details of leaked memory
==10013== 
==10013== Use --track-origins=yes to see where uninitialised values come from
==10013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10013== 
==10013== 1 errors in context 1 of 2:
==10013== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10013==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10013==    by 0x488CD0: stringsubst (subst.c:301)
==10013==    by 0x48801B: prefork (subst.c:77)
==10013==    by 0x42B318: execcmd (exec.c:2619)
==10013==    by 0x428CA0: execpline2 (exec.c:1697)
==10013==    by 0x427FD2: execpline (exec.c:1484)
==10013==    by 0x427756: execlist (exec.c:1267)
==10013==    by 0x42717C: execode (exec.c:1073)
==10013==    by 0x431299: runshfunc (exec.c:5040)
==10013==    by 0x430E76: doshfunc (exec.c:4920)
==10013==    by 0x4302FB: execshfunc (exec.c:4557)
==10013==    by 0x42D8C1: execcmd (exec.c:3373)
==10013== 
==10013== 
==10013== 2 errors in context 2 of 2:
==10013== Conditional jump or move depends on uninitialised value(s)
==10013==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10013==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10013==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10013==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10013==    by 0x42D8E9: execcmd (exec.c:3378)
==10013==    by 0x428CA0: execpline2 (exec.c:1697)
==10013==    by 0x427FD2: execpline (exec.c:1484)
==10013==    by 0x42779A: execlist (exec.c:1275)
==10013==    by 0x42717C: execode (exec.c:1073)
==10013==    by 0x431299: runshfunc (exec.c:5040)
==10013==    by 0x430E76: doshfunc (exec.c:4920)
==10013==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10013== 
==10013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10069== LEAK SUMMARY:
==10069==    definitely lost: 2,197 bytes in 13 blocks
==10069==    indirectly lost: 6,756 bytes in 7 blocks
==10069==      possibly lost: 0 bytes in 0 blocks
==10069==    still reachable: 3,115,687 bytes in 69,146 blocks
==10069==         suppressed: 0 bytes in 0 blocks
==10069== Rerun with --leak-check=full to see details of leaked memory
==10069== 
==10069== Use --track-origins=yes to see where uninitialised values come from
==10069== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10069== 
==10069== 1 errors in context 1 of 2:
==10069== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10069==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10069==    by 0x488CD0: stringsubst (subst.c:301)
==10069==    by 0x48801B: prefork (subst.c:77)
==10069==    by 0x42B318: execcmd (exec.c:2619)
==10069==    by 0x428CA0: execpline2 (exec.c:1697)
==10069==    by 0x427FD2: execpline (exec.c:1484)
==10069==    by 0x427756: execlist (exec.c:1267)
==10069==    by 0x42717C: execode (exec.c:1073)
==10069==    by 0x431299: runshfunc (exec.c:5040)
==10069==    by 0x430E76: doshfunc (exec.c:4920)
==10069==    by 0x4302FB: execshfunc (exec.c:4557)
==10069==    by 0x42D8C1: execcmd (exec.c:3373)
==10069== 
==10069== 
==10069== 2 errors in context 2 of 2:
==10069== Conditional jump or move depends on uninitialised value(s)
==10069==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10069==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10069==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10069==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10069==    by 0x42D8E9: execcmd (exec.c:3378)
==10069==    by 0x428CA0: execpline2 (exec.c:1697)
==10069==    by 0x427FD2: execpline (exec.c:1484)
==10069==    by 0x42779A: execlist (exec.c:1275)
==10069==    by 0x42717C: execode (exec.c:1073)
==10069==    by 0x431299: runshfunc (exec.c:5040)
==10069==    by 0x430E76: doshfunc (exec.c:4920)
==10069==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10069== 
==10069== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9900-- Caught __NR_exit; running __libc_freeres()
--9900-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10070== Checked 5,700,184 bytes
==10070== 
==9900== 
==9900== HEAP SUMMARY:
==9900==     in use at exit: 3,112,089 bytes in 68,919 blocks
==9900==   total heap usage: 1,592,188 allocs, 1,523,269 frees, 128,588,521 bytes allocated
==9900== 
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10070== LEAK SUMMARY:
==10070==    definitely lost: 2,189 bytes in 12 blocks
==10070==    indirectly lost: 6,756 bytes in 7 blocks
==10070==      possibly lost: 0 bytes in 0 blocks
==10070==    still reachable: 3,135,247 bytes in 69,910 blocks
==10070==         suppressed: 0 bytes in 0 blocks
==10070== Rerun with --leak-check=full to see details of leaked memory
==10070== 
==10070== Use --track-origins=yes to see where uninitialised values come from
==10070== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10070== 
==10070== 1 errors in context 1 of 2:
==10070== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10070==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10070==    by 0x488CD0: stringsubst (subst.c:301)
==10070==    by 0x48801B: prefork (subst.c:77)
==10070==    by 0x42B318: execcmd (exec.c:2619)
==10070==    by 0x428CA0: execpline2 (exec.c:1697)
==10070==    by 0x427FD2: execpline (exec.c:1484)
==10070==    by 0x427756: execlist (exec.c:1267)
==10070==    by 0x42717C: execode (exec.c:1073)
==10070==    by 0x431299: runshfunc (exec.c:5040)
==10070==    by 0x430E76: doshfunc (exec.c:4920)
==10070==    by 0x4302FB: execshfunc (exec.c:4557)
==10070==    by 0x42D8C1: execcmd (exec.c:3373)
==10070== 
==10070== 
==10070== 2 errors in context 2 of 2:
==10070== Conditional jump or move depends on uninitialised value(s)
==10070==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10070==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10070==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10070==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10070==    by 0x42D8E9: execcmd (exec.c:3378)
==10070==    by 0x428CA0: execpline2 (exec.c:1697)
==10070==    by 0x427FD2: execpline (exec.c:1484)
==10070==    by 0x42779A: execlist (exec.c:1275)
==10070==    by 0x42717C: execode (exec.c:1073)
==10070==    by 0x431299: runshfunc (exec.c:5040)
==10070==    by 0x430E76: doshfunc (exec.c:4920)
==10070==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10070== 
==10070== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9900== Searching for pointers to 68,919 not-freed blocks
--9900--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9900--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9900--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9900--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9900--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9900--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9900--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9900--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9900--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9900--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9900--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9900--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9900--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9900--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9900--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9900--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9900--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9900--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9900--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9900--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9900--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9900--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9900--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9900--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9900--   Scanning root segment: 0x701a000..0x701afff (4096)
--9900--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9900--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9900--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9900--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9900--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9900--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9900--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9900--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9900--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9900--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10073== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10073-by-pythonnut-on-???
==10073== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10073-by-pythonnut-on-???
==10073== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10073-by-pythonnut-on-???
==10073== 
==10073== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10073== don't want to do, unless you know exactly what you're doing,
==10073== or are doing some strange experiment):
==10073==   /usr/lib/valgrind/../../bin/vgdb --pid=10073 ...command...
==10073== 
==10073== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10073==   /path/to/gdb ./zsh
==10073== and then give GDB the following command
==10073==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10073
==10073== --pid is optional if only one valgrind process is running
==10073== 
--10073-- Caught __NR_exit; running __libc_freeres()
==10072== 
==10072== Process terminating with default action of signal 15 (SIGTERM)
==10072==    at 0x59EEDC7: kill (in /usr/lib/libc-2.20.so)
==10072==    by 0x4505D6: bin_kill (jobs.c:2451)
==10072==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10072==    by 0x42D8E9: execcmd (exec.c:3378)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x427756: execlist (exec.c:1267)
==10072==    by 0x45689D: execif (loop.c:525)
==10072==    by 0x42D731: execcmd (exec.c:3336)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x427756: execlist (exec.c:1267)
--10072-- Caught __NR_exit; running __libc_freeres()
==10072== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10072-by-pythonnut-on-???
==10072== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10072-by-pythonnut-on-???
==10072== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10072-by-pythonnut-on-???
==10072== 
==10072== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10072== don't want to do, unless you know exactly what you're doing,
==10072== or are doing some strange experiment):
==10072==   /usr/lib/valgrind/../../bin/vgdb --pid=10072 ...command...
==10072== 
==10072== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10072==   /path/to/gdb ./zsh
==10072== and then give GDB the following command
==10072==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10072
==10072== --pid is optional if only one valgrind process is running
==10072== 
==10074== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10074-by-pythonnut-on-???
==10074== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10074-by-pythonnut-on-???
==10074== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10074-by-pythonnut-on-???
==10074== 
==10074== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10074== don't want to do, unless you know exactly what you're doing,
==10074== or are doing some strange experiment):
==10074==   /usr/lib/valgrind/../../bin/vgdb --pid=10074 ...command...
==10074== 
==10074== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10074==   /path/to/gdb ./zsh
==10074== and then give GDB the following command
==10074==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10074
==10074== --pid is optional if only one valgrind process is running
==10074== 
--10073-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10073== 
--10072-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10073== HEAP SUMMARY:
==10073==     in use at exit: 3,144,192 bytes in 69,929 blocks
==10073==   total heap usage: 1,593,075 allocs, 1,523,146 frees, 128,648,157 bytes allocated
==10073== 
client request: code 4d430005,  addr 0xFFEFED0EC,  len 4
==10072== 
==10072== HEAP SUMMARY:
==10072==     in use at exit: 3,128,661 bytes in 69,244 blocks
==10072==   total heap usage: 1,594,711 allocs, 1,525,467 frees, 128,786,033 bytes allocated
==10072== 
==10076== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10076-by-pythonnut-on-???
==10076== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10076-by-pythonnut-on-???
==10076== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10076-by-pythonnut-on-???
==10076== 
==10076== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10076== don't want to do, unless you know exactly what you're doing,
==10076== or are doing some strange experiment):
==10076==   /usr/lib/valgrind/../../bin/vgdb --pid=10076 ...command...
==10076== 
==10076== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10076==   /path/to/gdb ./zsh
==10076== and then give GDB the following command
==10076==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10076
==10076== --pid is optional if only one valgrind process is running
==10076== 
--10076-- Caught __NR_exit; running __libc_freeres()
==10073== Searching for pointers to 69,929 not-freed blocks
--10073--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10073--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10073--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10073--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10073--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10073--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10073--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10073--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10073--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10073--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10073--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10073--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10073--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10073--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10073--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10073--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10073--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10073--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10073--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10073--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10073--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10073--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10073--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10073--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10073--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10073--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10073--   Scanning root segment: 0x701a000..0x701afff (4096)
--10073--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10073--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10073--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10073--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10073--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10073--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10073--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10073--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10073--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10073--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10073--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
==10072== Searching for pointers to 69,244 not-freed blocks
--10073--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10072--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10072--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10072--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10072--   Scanning root segment: 0x4037000..0x403afff (16384)
--10072--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10072--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10072--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10072--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10072--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10072--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10072--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10072--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10072--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10072--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10072--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10072--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10072--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10072--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10072--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10072--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10072--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10072--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10072--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10072--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10072--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10072--   Scanning root segment: 0x701a000..0x701afff (4096)
--10072--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10072--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10072--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10072--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10072--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10072--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10072--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10072--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10072--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10072--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9900== Checked 4,767,184 bytes
==9900== 
--10076-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10076== 
==10076== HEAP SUMMARY:
==10076==     in use at exit: 3,124,904 bytes in 69,172 blocks
==10076==   total heap usage: 1,594,861 allocs, 1,525,689 frees, 128,802,641 bytes allocated
==10076== 
==9900== LEAK SUMMARY:
==9900==    definitely lost: 2,189 bytes in 12 blocks
==9900==    indirectly lost: 6,756 bytes in 7 blocks
==9900==      possibly lost: 0 bytes in 0 blocks
==9900==    still reachable: 3,103,144 bytes in 68,900 blocks
==9900==         suppressed: 0 bytes in 0 blocks
==9900== Rerun with --leak-check=full to see details of leaked memory
==9900== 
==9900== Use --track-origins=yes to see where uninitialised values come from
==9900== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9900== 
==9900== 1 errors in context 1 of 2:
==9900== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9900==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9900==    by 0x488CD0: stringsubst (subst.c:301)
==9900==    by 0x48801B: prefork (subst.c:77)
==9900==    by 0x42B318: execcmd (exec.c:2619)
==9900==    by 0x428CA0: execpline2 (exec.c:1697)
==9900==    by 0x427FD2: execpline (exec.c:1484)
==9900==    by 0x427756: execlist (exec.c:1267)
==9900==    by 0x42717C: execode (exec.c:1073)
==9900==    by 0x431299: runshfunc (exec.c:5040)
==9900==    by 0x430E76: doshfunc (exec.c:4920)
==9900==    by 0x4302FB: execshfunc (exec.c:4557)
==9900==    by 0x42D8C1: execcmd (exec.c:3373)
==9900== 
==9900== 
==9900== 2 errors in context 2 of 2:
==9900== Conditional jump or move depends on uninitialised value(s)
==9900==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9900==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9900==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9900==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9900==    by 0x42D8E9: execcmd (exec.c:3378)
==9900==    by 0x428CA0: execpline2 (exec.c:1697)
==9900==    by 0x427FD2: execpline (exec.c:1484)
==9900==    by 0x42779A: execlist (exec.c:1275)
==9900==    by 0x42717C: execode (exec.c:1073)
==9900==    by 0x431299: runshfunc (exec.c:5040)
==9900==    by 0x430E76: doshfunc (exec.c:4920)
==9900==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9900== 
==9900== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10076== Searching for pointers to 69,172 not-freed blocks
--10076--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10076--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10076--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10076--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10076--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10076--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10076--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10076--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10076--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10076--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10076--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10076--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10076--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10076--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10076--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10076--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10076--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10076--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10076--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10076--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10076--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10076--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10076--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10076--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10076--   Scanning root segment: 0x701a000..0x701afff (4096)
--10076--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10076--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10076--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10076--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10076--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10076--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10076--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10076--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10076--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10076--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10073== Checked 5,700,184 bytes
==10073== 
==10072== Checked 4,808,368 bytes
==10072== 
==10073== LEAK SUMMARY:
==10073==    definitely lost: 2,189 bytes in 12 blocks
==10073==    indirectly lost: 6,756 bytes in 7 blocks
==10073==      possibly lost: 0 bytes in 0 blocks
==10073==    still reachable: 3,135,247 bytes in 69,910 blocks
==10073==         suppressed: 0 bytes in 0 blocks
==10073== Rerun with --leak-check=full to see details of leaked memory
==10073== 
==10073== Use --track-origins=yes to see where uninitialised values come from
==10073== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10073== 
==10073== 1 errors in context 1 of 2:
==10073== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10073==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10073==    by 0x488CD0: stringsubst (subst.c:301)
==10073==    by 0x48801B: prefork (subst.c:77)
==10073==    by 0x42B318: execcmd (exec.c:2619)
==10073==    by 0x428CA0: execpline2 (exec.c:1697)
==10073==    by 0x427FD2: execpline (exec.c:1484)
==10073==    by 0x427756: execlist (exec.c:1267)
==10073==    by 0x42717C: execode (exec.c:1073)
==10073==    by 0x431299: runshfunc (exec.c:5040)
==10073==    by 0x430E76: doshfunc (exec.c:4920)
==10073==    by 0x4302FB: execshfunc (exec.c:4557)
==10073==    by 0x42D8C1: execcmd (exec.c:3373)
==10073== 
==10073== 
==10073== 2 errors in context 2 of 2:
==10073== Conditional jump or move depends on uninitialised value(s)
==10073==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10073==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10073==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10073==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10073==    by 0x42D8E9: execcmd (exec.c:3378)
==10073==    by 0x428CA0: execpline2 (exec.c:1697)
==10073==    by 0x427FD2: execpline (exec.c:1484)
==10073==    by 0x42779A: execlist (exec.c:1275)
==10073==    by 0x42717C: execode (exec.c:1073)
==10073==    by 0x431299: runshfunc (exec.c:5040)
==10073==    by 0x430E76: doshfunc (exec.c:4920)
==10073==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10073== 
==10073== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10072== LEAK SUMMARY:
==10072==    definitely lost: 2,197 bytes in 13 blocks
==10072==    indirectly lost: 6,756 bytes in 7 blocks
==10072==      possibly lost: 0 bytes in 0 blocks
==10072==    still reachable: 3,119,708 bytes in 69,224 blocks
==10072==         suppressed: 0 bytes in 0 blocks
==10072== Rerun with --leak-check=full to see details of leaked memory
==10072== 
==10072== Use --track-origins=yes to see where uninitialised values come from
==10072== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10072== 
==10072== 1 errors in context 1 of 2:
==10072== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10072==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10072==    by 0x488CD0: stringsubst (subst.c:301)
==10072==    by 0x48801B: prefork (subst.c:77)
==10072==    by 0x42B318: execcmd (exec.c:2619)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x427756: execlist (exec.c:1267)
==10072==    by 0x42717C: execode (exec.c:1073)
==10072==    by 0x431299: runshfunc (exec.c:5040)
==10072==    by 0x430E76: doshfunc (exec.c:4920)
==10072==    by 0x4302FB: execshfunc (exec.c:4557)
==10072==    by 0x42D8C1: execcmd (exec.c:3373)
==10072== 
==10072== 
==10072== 2 errors in context 2 of 2:
==10072== Conditional jump or move depends on uninitialised value(s)
==10072==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10072==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10072==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10072==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10072==    by 0x42D8E9: execcmd (exec.c:3378)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x42779A: execlist (exec.c:1275)
==10072==    by 0x42717C: execode (exec.c:1073)
==10072==    by 0x431299: runshfunc (exec.c:5040)
==10072==    by 0x430E76: doshfunc (exec.c:4920)
==10072==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10072== 
==10072== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9963-- Caught __NR_exit; running __libc_freeres()
--9963-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10076== Checked 4,784,720 bytes
==10076== 
==9963== 
==9963== HEAP SUMMARY:
==9963==     in use at exit: 3,115,893 bytes in 69,048 blocks
==9963==   total heap usage: 1,593,017 allocs, 1,523,969 frees, 128,647,287 bytes allocated
==9963== 
==10076== LEAK SUMMARY:
==10076==    definitely lost: 2,197 bytes in 13 blocks
==10076==    indirectly lost: 6,756 bytes in 7 blocks
==10076==      possibly lost: 0 bytes in 0 blocks
==10076==    still reachable: 3,115,951 bytes in 69,152 blocks
==10076==         suppressed: 0 bytes in 0 blocks
==10076== Rerun with --leak-check=full to see details of leaked memory
==10076== 
==10076== Use --track-origins=yes to see where uninitialised values come from
==10076== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10076== 
==10076== 1 errors in context 1 of 2:
==10076== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10076==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10076==    by 0x488CD0: stringsubst (subst.c:301)
==10076==    by 0x48801B: prefork (subst.c:77)
==10076==    by 0x42B318: execcmd (exec.c:2619)
==10076==    by 0x428CA0: execpline2 (exec.c:1697)
==10076==    by 0x427FD2: execpline (exec.c:1484)
==10076==    by 0x427756: execlist (exec.c:1267)
==10076==    by 0x42717C: execode (exec.c:1073)
==10076==    by 0x431299: runshfunc (exec.c:5040)
==10076==    by 0x430E76: doshfunc (exec.c:4920)
==10076==    by 0x4302FB: execshfunc (exec.c:4557)
==10076==    by 0x42D8C1: execcmd (exec.c:3373)
==10076== 
==10076== 
==10076== 2 errors in context 2 of 2:
==10076== Conditional jump or move depends on uninitialised value(s)
==10076==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10076==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10076==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10076==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10076==    by 0x42D8E9: execcmd (exec.c:3378)
==10076==    by 0x428CA0: execpline2 (exec.c:1697)
==10076==    by 0x427FD2: execpline (exec.c:1484)
==10076==    by 0x42779A: execlist (exec.c:1275)
==10076==    by 0x42717C: execode (exec.c:1073)
==10076==    by 0x431299: runshfunc (exec.c:5040)
==10076==    by 0x430E76: doshfunc (exec.c:4920)
==10076==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10076== 
==10076== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== Searching for pointers to 69,048 not-freed blocks
--9963--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9963--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9963--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9963--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9963--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9963--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9963--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9963--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9963--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9963--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9963--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9963--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9963--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9963--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9963--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9963--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9963--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9963--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9963--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9963--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9963--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9963--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9963--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9963--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9963--   Scanning root segment: 0x701a000..0x701afff (4096)
--9963--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9963--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9963--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9963--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9963--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9963--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9963--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9963--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9963--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9963--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10077-- Caught __NR_exit; running __libc_freeres()
==10077== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10077-by-pythonnut-on-???
==10077== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10077-by-pythonnut-on-???
==10077== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10077-by-pythonnut-on-???
==10077== 
==10077== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10077== don't want to do, unless you know exactly what you're doing,
==10077== or are doing some strange experiment):
==10077==   /usr/lib/valgrind/../../bin/vgdb --pid=10077 ...command...
==10077== 
==10077== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10077==   /path/to/gdb ./zsh
==10077== and then give GDB the following command
==10077==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10077
==10077== --pid is optional if only one valgrind process is running
==10077== 
--10077-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10077== 
==10077== HEAP SUMMARY:
==10077==     in use at exit: 3,124,808 bytes in 69,172 blocks
==10077==   total heap usage: 1,594,841 allocs, 1,525,669 frees, 128,800,411 bytes allocated
==10077== 
==10077== Searching for pointers to 69,172 not-freed blocks
--10077--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10077--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10077--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10077--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10077--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10077--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10077--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10077--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10077--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10077--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10077--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10077--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10077--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10077--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10077--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10077--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10077--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10077--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10077--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10077--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10077--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10077--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10077--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10077--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10077--   Scanning root segment: 0x701a000..0x701afff (4096)
--10077--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10077--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10077--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10077--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10077--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10077--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10077--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10077--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10077--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10077--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9963== Checked 4,772,800 bytes
==9963== 
==9963== LEAK SUMMARY:
==9963==    definitely lost: 2,189 bytes in 12 blocks
==9963==    indirectly lost: 6,756 bytes in 7 blocks
==9963==      possibly lost: 0 bytes in 0 blocks
==9963==    still reachable: 3,106,948 bytes in 69,029 blocks
==9963==         suppressed: 0 bytes in 0 blocks
==9963== Rerun with --leak-check=full to see details of leaked memory
==9963== 
==9963== Use --track-origins=yes to see where uninitialised values come from
==9963== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== 
==9963== 1 errors in context 1 of 2:
==9963== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9963==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9963==    by 0x488CD0: stringsubst (subst.c:301)
==9963==    by 0x48801B: prefork (subst.c:77)
==9963==    by 0x42B318: execcmd (exec.c:2619)
==9963==    by 0x428CA0: execpline2 (exec.c:1697)
==9963==    by 0x427FD2: execpline (exec.c:1484)
==9963==    by 0x427756: execlist (exec.c:1267)
==9963==    by 0x42717C: execode (exec.c:1073)
==9963==    by 0x431299: runshfunc (exec.c:5040)
==9963==    by 0x430E76: doshfunc (exec.c:4920)
==9963==    by 0x4302FB: execshfunc (exec.c:4557)
==9963==    by 0x42D8C1: execcmd (exec.c:3373)
==9963== 
==9963== 
==9963== 2 errors in context 2 of 2:
==9963== Conditional jump or move depends on uninitialised value(s)
==9963==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9963==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9963==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9963==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9963==    by 0x42D8E9: execcmd (exec.c:3378)
==9963==    by 0x428CA0: execpline2 (exec.c:1697)
==9963==    by 0x427FD2: execpline (exec.c:1484)
==9963==    by 0x42779A: execlist (exec.c:1275)
==9963==    by 0x42717C: execode (exec.c:1073)
==9963==    by 0x431299: runshfunc (exec.c:5040)
==9963==    by 0x430E76: doshfunc (exec.c:4920)
==9963==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9963== 
==9963== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9898-- Caught __NR_exit; running __libc_freeres()
--9898-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9898== 
==9898== HEAP SUMMARY:
==9898==     in use at exit: 3,113,785 bytes in 68,977 blocks
==9898==   total heap usage: 1,592,046 allocs, 1,523,069 frees, 128,469,578 bytes allocated
==9898== 
==10077== Checked 4,784,624 bytes
==10077== 
==9898== Searching for pointers to 68,977 not-freed blocks
--9898--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9898--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9898--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9898--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9898--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9898--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9898--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9898--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9898--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9898--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9898--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9898--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9898--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9898--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9898--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9898--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9898--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9898--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9898--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9898--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9898--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9898--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9898--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9898--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9898--   Scanning root segment: 0x701a000..0x701afff (4096)
--9898--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9898--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9898--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9898--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9898--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9898--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9898--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9898--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9898--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9898--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10077== LEAK SUMMARY:
==10077==    definitely lost: 2,197 bytes in 13 blocks
==10077==    indirectly lost: 6,756 bytes in 7 blocks
==10077==      possibly lost: 0 bytes in 0 blocks
==10077==    still reachable: 3,115,855 bytes in 69,152 blocks
==10077==         suppressed: 0 bytes in 0 blocks
==10077== Rerun with --leak-check=full to see details of leaked memory
==10077== 
==10077== Use --track-origins=yes to see where uninitialised values come from
==10077== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10077== 
==10077== 1 errors in context 1 of 2:
==10077== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10077==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10077==    by 0x488CD0: stringsubst (subst.c:301)
==10077==    by 0x48801B: prefork (subst.c:77)
==10077==    by 0x42B318: execcmd (exec.c:2619)
==10077==    by 0x428CA0: execpline2 (exec.c:1697)
==10077==    by 0x427FD2: execpline (exec.c:1484)
==10077==    by 0x427756: execlist (exec.c:1267)
==10077==    by 0x42717C: execode (exec.c:1073)
==10077==    by 0x431299: runshfunc (exec.c:5040)
==10077==    by 0x430E76: doshfunc (exec.c:4920)
==10077==    by 0x4302FB: execshfunc (exec.c:4557)
==10077==    by 0x42D8C1: execcmd (exec.c:3373)
==10077== 
==10077== 
==10077== 2 errors in context 2 of 2:
==10077== Conditional jump or move depends on uninitialised value(s)
==10077==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10077==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10077==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10077==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10077==    by 0x42D8E9: execcmd (exec.c:3378)
==10077==    by 0x428CA0: execpline2 (exec.c:1697)
==10077==    by 0x427FD2: execpline (exec.c:1484)
==10077==    by 0x42779A: execlist (exec.c:1275)
==10077==    by 0x42717C: execode (exec.c:1073)
==10077==    by 0x431299: runshfunc (exec.c:5040)
==10077==    by 0x430E76: doshfunc (exec.c:4920)
==10077==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10077== 
==10077== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEC70C,  len 4
==10079== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10079-by-pythonnut-on-???
==10079== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10079-by-pythonnut-on-???
==10079== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10079-by-pythonnut-on-???
==10079== 
==10079== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10079== don't want to do, unless you know exactly what you're doing,
==10079== or are doing some strange experiment):
==10079==   /usr/lib/valgrind/../../bin/vgdb --pid=10079 ...command...
==10079== 
==10079== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10079==   /path/to/gdb ./zsh
==10079== and then give GDB the following command
==10079==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10079
==10079== --pid is optional if only one valgrind process is running
==10079== 
--10080-- Caught __NR_exit; running __libc_freeres()
==10080== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10080-by-pythonnut-on-???
==10080== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10080-by-pythonnut-on-???
==10080== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10080-by-pythonnut-on-???
==10080== 
==10080== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10080== don't want to do, unless you know exactly what you're doing,
==10080== or are doing some strange experiment):
==10080==   /usr/lib/valgrind/../../bin/vgdb --pid=10080 ...command...
==10080== 
==10080== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10080==   /path/to/gdb ./zsh
==10080== and then give GDB the following command
==10080==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10080
==10080== --pid is optional if only one valgrind process is running
==10080== 
client request: code 4d430005,  addr 0xFFEFED07C,  len 4
==9898== Checked 4,770,304 bytes
==9898== 
--10080-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10080== 
==10080== HEAP SUMMARY:
==10080==     in use at exit: 3,128,702 bytes in 69,255 blocks
==10080==   total heap usage: 1,595,036 allocs, 1,525,781 frees, 128,818,731 bytes allocated
==10080== 
==9898== LEAK SUMMARY:
==9898==    definitely lost: 2,189 bytes in 12 blocks
==9898==    indirectly lost: 6,756 bytes in 7 blocks
==9898==      possibly lost: 0 bytes in 0 blocks
==9898==    still reachable: 3,104,840 bytes in 68,958 blocks
==9898==         suppressed: 0 bytes in 0 blocks
==9898== Rerun with --leak-check=full to see details of leaked memory
==9898== 
==9898== Use --track-origins=yes to see where uninitialised values come from
==9898== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9898== 
==9898== 1 errors in context 1 of 2:
==9898== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9898==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9898==    by 0x488CD0: stringsubst (subst.c:301)
==9898==    by 0x48801B: prefork (subst.c:77)
==9898==    by 0x42B318: execcmd (exec.c:2619)
==9898==    by 0x428CA0: execpline2 (exec.c:1697)
==9898==    by 0x427FD2: execpline (exec.c:1484)
==9898==    by 0x427756: execlist (exec.c:1267)
==9898==    by 0x42717C: execode (exec.c:1073)
==9898==    by 0x431299: runshfunc (exec.c:5040)
==9898==    by 0x430E76: doshfunc (exec.c:4920)
==9898==    by 0x4302FB: execshfunc (exec.c:4557)
==9898==    by 0x42D8C1: execcmd (exec.c:3373)
==9898== 
==9898== 
==9898== 2 errors in context 2 of 2:
==9898== Conditional jump or move depends on uninitialised value(s)
==9898==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9898==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9898==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9898==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9898==    by 0x42D8E9: execcmd (exec.c:3378)
==9898==    by 0x428CA0: execpline2 (exec.c:1697)
==9898==    by 0x427FD2: execpline (exec.c:1484)
==9898==    by 0x42779A: execlist (exec.c:1275)
==9898==    by 0x42717C: execode (exec.c:1073)
==9898==    by 0x431299: runshfunc (exec.c:5040)
==9898==    by 0x430E76: doshfunc (exec.c:4920)
==9898==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9898== 
==9898== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10080== Searching for pointers to 69,255 not-freed blocks
--10080--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10080--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10080--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10080--   Scanning root segment: 0x4037000..0x403afff (16384)
--10080--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10080--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10080--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10080--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10080--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10080--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10080--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10080--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10080--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10080--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10080--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10080--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10080--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10080--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10080--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10080--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10080--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10080--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10080--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10080--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10080--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10080--   Scanning root segment: 0x701a000..0x701afff (4096)
--10080--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10080--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10080--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10080--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10080--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10080--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10080--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10080--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10080--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10080--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10080== Checked 4,808,080 bytes
==10080== 
==10080== LEAK SUMMARY:
==10080==    definitely lost: 2,197 bytes in 13 blocks
==10080==    indirectly lost: 6,756 bytes in 7 blocks
==10080==      possibly lost: 0 bytes in 0 blocks
==10080==    still reachable: 3,119,749 bytes in 69,235 blocks
==10080==         suppressed: 0 bytes in 0 blocks
==10080== Rerun with --leak-check=full to see details of leaked memory
==10080== 
==10080== Use --track-origins=yes to see where uninitialised values come from
==10080== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10080== 
==10080== 1 errors in context 1 of 2:
==10080== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10080==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10080==    by 0x488CD0: stringsubst (subst.c:301)
==10080==    by 0x48801B: prefork (subst.c:77)
==10080==    by 0x42B318: execcmd (exec.c:2619)
==10080==    by 0x428CA0: execpline2 (exec.c:1697)
==10080==    by 0x427FD2: execpline (exec.c:1484)
==10080==    by 0x427756: execlist (exec.c:1267)
==10080==    by 0x42717C: execode (exec.c:1073)
==10080==    by 0x431299: runshfunc (exec.c:5040)
==10080==    by 0x430E76: doshfunc (exec.c:4920)
==10080==    by 0x4302FB: execshfunc (exec.c:4557)
==10080==    by 0x42D8C1: execcmd (exec.c:3373)
==10080== 
==10080== 
==10080== 2 errors in context 2 of 2:
==10080== Conditional jump or move depends on uninitialised value(s)
==10080==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10080==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10080==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10080==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10080==    by 0x42D8E9: execcmd (exec.c:3378)
==10080==    by 0x428CA0: execpline2 (exec.c:1697)
==10080==    by 0x427FD2: execpline (exec.c:1484)
==10080==    by 0x42779A: execlist (exec.c:1275)
==10080==    by 0x42717C: execode (exec.c:1073)
==10080==    by 0x431299: runshfunc (exec.c:5040)
==10080==    by 0x430E76: doshfunc (exec.c:4920)
==10080==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10080== 
==10080== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10079-- Caught __NR_exit; running __libc_freeres()
--10079-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10079== 
==10079== HEAP SUMMARY:
==10079==     in use at exit: 3,128,638 bytes in 69,252 blocks
==10079==   total heap usage: 1,595,034 allocs, 1,525,782 frees, 128,818,490 bytes allocated
==10079== 
==10079== Searching for pointers to 69,252 not-freed blocks
--10079--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10079--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10079--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10079--   Scanning root segment: 0x4037000..0x403afff (16384)
--10079--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10079--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10079--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10079--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10079--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10079--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10079--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10079--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10079--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10079--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10079--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10079--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10079--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10079--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10079--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10079--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10079--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10079--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10079--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10079--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10079--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10079--   Scanning root segment: 0x701a000..0x701afff (4096)
--10079--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10079--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10079--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10079--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10079--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10079--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10079--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10079--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10079--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10079--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10079== Checked 4,807,392 bytes
==10079== 
==10079== LEAK SUMMARY:
==10079==    definitely lost: 2,197 bytes in 13 blocks
==10079==    indirectly lost: 6,756 bytes in 7 blocks
==10079==      possibly lost: 0 bytes in 0 blocks
==10079==    still reachable: 3,119,685 bytes in 69,232 blocks
==10079==         suppressed: 0 bytes in 0 blocks
==10079== Rerun with --leak-check=full to see details of leaked memory
==10079== 
==10079== Use --track-origins=yes to see where uninitialised values come from
==10079== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10079== 
==10079== 1 errors in context 1 of 2:
==10079== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10079==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10079==    by 0x488CD0: stringsubst (subst.c:301)
==10079==    by 0x48801B: prefork (subst.c:77)
==10079==    by 0x42B318: execcmd (exec.c:2619)
==10079==    by 0x428CA0: execpline2 (exec.c:1697)
==10079==    by 0x427FD2: execpline (exec.c:1484)
==10079==    by 0x427756: execlist (exec.c:1267)
==10079==    by 0x42717C: execode (exec.c:1073)
==10079==    by 0x431299: runshfunc (exec.c:5040)
==10079==    by 0x430E76: doshfunc (exec.c:4920)
==10079==    by 0x4302FB: execshfunc (exec.c:4557)
==10079==    by 0x42D8C1: execcmd (exec.c:3373)
==10079== 
==10079== 
==10079== 2 errors in context 2 of 2:
==10079== Conditional jump or move depends on uninitialised value(s)
==10079==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10079==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10079==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10079==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10079==    by 0x42D8E9: execcmd (exec.c:3378)
==10079==    by 0x428CA0: execpline2 (exec.c:1697)
==10079==    by 0x427FD2: execpline (exec.c:1484)
==10079==    by 0x42779A: execlist (exec.c:1275)
==10079==    by 0x42717C: execode (exec.c:1073)
==10079==    by 0x431299: runshfunc (exec.c:5040)
==10079==    by 0x430E76: doshfunc (exec.c:4920)
==10079==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10079== 
==10079== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10084-- Caught __NR_exit; running __libc_freeres()
==10084== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10084-by-pythonnut-on-???
==10084== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10084-by-pythonnut-on-???
==10084== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10084-by-pythonnut-on-???
==10084== 
==10084== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10084== don't want to do, unless you know exactly what you're doing,
==10084== or are doing some strange experiment):
==10084==   /usr/lib/valgrind/../../bin/vgdb --pid=10084 ...command...
==10084== 
==10084== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10084==   /path/to/gdb ./zsh
==10084== and then give GDB the following command
==10084==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10084
==10084== --pid is optional if only one valgrind process is running
==10084== 
--10084-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10084== 
==10084== HEAP SUMMARY:
==10084==     in use at exit: 3,128,645 bytes in 69,252 blocks
==10084==   total heap usage: 1,595,049 allocs, 1,525,797 frees, 128,823,488 bytes allocated
==10084== 
==10084== Searching for pointers to 69,252 not-freed blocks
--10084--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10084--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10084--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10084--   Scanning root segment: 0x4037000..0x403afff (16384)
--10084--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10084--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10084--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10084--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10084--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10084--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10084--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10084--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10084--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10084--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10084--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10084--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10084--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10084--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10084--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10084--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10084--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10084--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10084--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10084--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10084--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10084--   Scanning root segment: 0x701a000..0x701afff (4096)
--10084--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10084--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10084--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10084--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10084--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10084--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10084--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10084--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10084--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10084--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10084== Checked 4,807,528 bytes
==10084== 
==10084== LEAK SUMMARY:
==10084==    definitely lost: 2,197 bytes in 13 blocks
==10084==    indirectly lost: 6,756 bytes in 7 blocks
==10084==      possibly lost: 0 bytes in 0 blocks
==10084==    still reachable: 3,119,692 bytes in 69,232 blocks
==10084==         suppressed: 0 bytes in 0 blocks
==10084== Rerun with --leak-check=full to see details of leaked memory
==10084== 
==10084== Use --track-origins=yes to see where uninitialised values come from
==10084== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10084== 
==10084== 1 errors in context 1 of 2:
==10084== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10084==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10084==    by 0x488CD0: stringsubst (subst.c:301)
==10084==    by 0x48801B: prefork (subst.c:77)
==10084==    by 0x42B318: execcmd (exec.c:2619)
==10084==    by 0x428CA0: execpline2 (exec.c:1697)
==10084==    by 0x427FD2: execpline (exec.c:1484)
==10084==    by 0x427756: execlist (exec.c:1267)
==10084==    by 0x42717C: execode (exec.c:1073)
==10084==    by 0x431299: runshfunc (exec.c:5040)
==10084==    by 0x430E76: doshfunc (exec.c:4920)
==10084==    by 0x4302FB: execshfunc (exec.c:4557)
==10084==    by 0x42D8C1: execcmd (exec.c:3373)
==10084== 
==10084== 
==10084== 2 errors in context 2 of 2:
==10084== Conditional jump or move depends on uninitialised value(s)
==10084==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10084==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10084==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10084==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10084==    by 0x42D8E9: execcmd (exec.c:3378)
==10084==    by 0x428CA0: execpline2 (exec.c:1697)
==10084==    by 0x427FD2: execpline (exec.c:1484)
==10084==    by 0x42779A: execlist (exec.c:1275)
==10084==    by 0x42717C: execode (exec.c:1073)
==10084==    by 0x431299: runshfunc (exec.c:5040)
==10084==    by 0x430E76: doshfunc (exec.c:4920)
==10084==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10084== 
==10084== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10085-- Caught __NR_exit; running __libc_freeres()
==10085== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10085-by-pythonnut-on-???
==10085== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10085-by-pythonnut-on-???
==10085== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10085-by-pythonnut-on-???
==10085== 
==10085== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10085== don't want to do, unless you know exactly what you're doing,
==10085== or are doing some strange experiment):
==10085==   /usr/lib/valgrind/../../bin/vgdb --pid=10085 ...command...
==10085== 
==10085== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10085==   /path/to/gdb ./zsh
==10085== and then give GDB the following command
==10085==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10085
==10085== --pid is optional if only one valgrind process is running
==10085== 
--10085-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10085== 
==10085== HEAP SUMMARY:
==10085==     in use at exit: 3,128,741 bytes in 69,252 blocks
==10085==   total heap usage: 1,595,065 allocs, 1,525,813 frees, 128,828,275 bytes allocated
==10085== 
==10085== Searching for pointers to 69,252 not-freed blocks
--10085--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10085--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10085--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10085--   Scanning root segment: 0x4037000..0x403afff (16384)
--10085--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10085--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10085--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10085--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10085--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10085--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10085--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10085--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10085--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10085--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10085--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10085--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10085--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10085--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10085--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10085--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10085--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10085--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10085--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10085--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10085--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10085--   Scanning root segment: 0x701a000..0x701afff (4096)
--10085--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10085--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10085--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10085--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10085--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10085--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10085--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10085--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10085--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10085--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10085== Checked 4,806,808 bytes
==10085== 
==10085== LEAK SUMMARY:
==10085==    definitely lost: 2,197 bytes in 13 blocks
==10085==    indirectly lost: 6,756 bytes in 7 blocks
==10085==      possibly lost: 0 bytes in 0 blocks
==10085==    still reachable: 3,119,788 bytes in 69,232 blocks
==10085==         suppressed: 0 bytes in 0 blocks
==10085== Rerun with --leak-check=full to see details of leaked memory
==10085== 
==10085== Use --track-origins=yes to see where uninitialised values come from
==10085== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10085== 
==10085== 1 errors in context 1 of 2:
==10085== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10085==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10085==    by 0x488CD0: stringsubst (subst.c:301)
==10085==    by 0x48801B: prefork (subst.c:77)
==10085==    by 0x42B318: execcmd (exec.c:2619)
==10085==    by 0x428CA0: execpline2 (exec.c:1697)
==10085==    by 0x427FD2: execpline (exec.c:1484)
==10085==    by 0x427756: execlist (exec.c:1267)
==10085==    by 0x42717C: execode (exec.c:1073)
==10085==    by 0x431299: runshfunc (exec.c:5040)
==10085==    by 0x430E76: doshfunc (exec.c:4920)
==10085==    by 0x4302FB: execshfunc (exec.c:4557)
==10085==    by 0x42D8C1: execcmd (exec.c:3373)
==10085== 
==10085== 
==10085== 2 errors in context 2 of 2:
==10085== Conditional jump or move depends on uninitialised value(s)
==10085==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10085==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10085==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10085==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10085==    by 0x42D8E9: execcmd (exec.c:3378)
==10085==    by 0x428CA0: execpline2 (exec.c:1697)
==10085==    by 0x427FD2: execpline (exec.c:1484)
==10085==    by 0x42779A: execlist (exec.c:1275)
==10085==    by 0x42717C: execode (exec.c:1073)
==10085==    by 0x431299: runshfunc (exec.c:5040)
==10085==    by 0x430E76: doshfunc (exec.c:4920)
==10085==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10085== 
==10085== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10086== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10086-by-pythonnut-on-???
==10086== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10086-by-pythonnut-on-???
==10086== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10086-by-pythonnut-on-???
==10086== 
==10086== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10086== don't want to do, unless you know exactly what you're doing,
==10086== or are doing some strange experiment):
==10086==   /usr/lib/valgrind/../../bin/vgdb --pid=10086 ...command...
==10086== 
==10086== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10086==   /path/to/gdb ./zsh
==10086== and then give GDB the following command
==10086==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10086
==10086== --pid is optional if only one valgrind process is running
==10086== 
--10086-- Caught __NR_exit; running __libc_freeres()
--10086-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10086== 
==10086== HEAP SUMMARY:
==10086==     in use at exit: 3,129,015 bytes in 69,258 blocks
==10086==   total heap usage: 1,595,113 allocs, 1,525,855 frees, 128,837,299 bytes allocated
==10086== 
==10086== Searching for pointers to 69,258 not-freed blocks
--10086--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10086--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10086--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10086--   Scanning root segment: 0x4037000..0x403afff (16384)
--10086--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10086--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10086--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10086--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10086--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10086--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10086--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10086--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10086--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10086--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10086--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10086--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10086--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10086--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10086--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10086--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10086--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10086--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10086--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10086--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10086--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10086--   Scanning root segment: 0x701a000..0x701afff (4096)
--10086--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10086--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10086--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10086--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10086--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10086--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10086--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10086--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10086--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10086--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10086== Checked 4,807,000 bytes
==10086== 
==10086== LEAK SUMMARY:
==10086==    definitely lost: 2,197 bytes in 13 blocks
==10086==    indirectly lost: 6,756 bytes in 7 blocks
==10086==      possibly lost: 0 bytes in 0 blocks
==10086==    still reachable: 3,120,062 bytes in 69,238 blocks
==10086==         suppressed: 0 bytes in 0 blocks
==10086== Rerun with --leak-check=full to see details of leaked memory
==10086== 
==10086== Use --track-origins=yes to see where uninitialised values come from
==10086== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10086== 
==10086== 1 errors in context 1 of 2:
==10086== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10086==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10086==    by 0x488CD0: stringsubst (subst.c:301)
==10086==    by 0x48801B: prefork (subst.c:77)
==10086==    by 0x42B318: execcmd (exec.c:2619)
==10086==    by 0x428CA0: execpline2 (exec.c:1697)
==10086==    by 0x427FD2: execpline (exec.c:1484)
==10086==    by 0x427756: execlist (exec.c:1267)
==10086==    by 0x42717C: execode (exec.c:1073)
==10086==    by 0x431299: runshfunc (exec.c:5040)
==10086==    by 0x430E76: doshfunc (exec.c:4920)
==10086==    by 0x4302FB: execshfunc (exec.c:4557)
==10086==    by 0x42D8C1: execcmd (exec.c:3373)
==10086== 
==10086== 
==10086== 2 errors in context 2 of 2:
==10086== Conditional jump or move depends on uninitialised value(s)
==10086==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10086==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10086==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10086==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10086==    by 0x42D8E9: execcmd (exec.c:3378)
==10086==    by 0x428CA0: execpline2 (exec.c:1697)
==10086==    by 0x427FD2: execpline (exec.c:1484)
==10086==    by 0x42779A: execlist (exec.c:1275)
==10086==    by 0x42717C: execode (exec.c:1073)
==10086==    by 0x431299: runshfunc (exec.c:5040)
==10086==    by 0x430E76: doshfunc (exec.c:4920)
==10086==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10086== 
==10086== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10087-- Caught __NR_exit; running __libc_freeres()
==10087== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10087-by-pythonnut-on-???
==10087== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10087-by-pythonnut-on-???
==10087== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10087-by-pythonnut-on-???
==10087== 
==10087== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10087== don't want to do, unless you know exactly what you're doing,
==10087== or are doing some strange experiment):
==10087==   /usr/lib/valgrind/../../bin/vgdb --pid=10087 ...command...
==10087== 
==10087== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10087==   /path/to/gdb ./zsh
==10087== and then give GDB the following command
==10087==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10087
==10087== --pid is optional if only one valgrind process is running
==10087== 
--10087-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10087== 
==10087== HEAP SUMMARY:
==10087==     in use at exit: 3,128,919 bytes in 69,258 blocks
==10087==   total heap usage: 1,595,093 allocs, 1,525,835 frees, 128,835,069 bytes allocated
==10087== 
==10087== Searching for pointers to 69,258 not-freed blocks
--10087--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10087--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10087--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10087--   Scanning root segment: 0x4037000..0x403afff (16384)
--10087--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10087--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10087--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10087--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10087--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10087--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10087--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10087--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10087--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10087--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10087--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10087--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10087--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10087--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10087--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10087--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10087--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10087--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10087--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10087--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10087--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10087--   Scanning root segment: 0x701a000..0x701afff (4096)
--10087--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10087--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10087--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10087--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10087--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10087--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10087--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10087--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10087--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10087--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10087== Checked 4,806,904 bytes
==10087== 
==10087== LEAK SUMMARY:
==10087==    definitely lost: 2,197 bytes in 13 blocks
==10087==    indirectly lost: 6,756 bytes in 7 blocks
==10087==      possibly lost: 0 bytes in 0 blocks
==10087==    still reachable: 3,119,966 bytes in 69,238 blocks
==10087==         suppressed: 0 bytes in 0 blocks
==10087== Rerun with --leak-check=full to see details of leaked memory
==10087== 
==10087== Use --track-origins=yes to see where uninitialised values come from
==10087== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10087== 
==10087== 1 errors in context 1 of 2:
==10087== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10087==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10087==    by 0x488CD0: stringsubst (subst.c:301)
==10087==    by 0x48801B: prefork (subst.c:77)
==10087==    by 0x42B318: execcmd (exec.c:2619)
==10087==    by 0x428CA0: execpline2 (exec.c:1697)
==10087==    by 0x427FD2: execpline (exec.c:1484)
==10087==    by 0x427756: execlist (exec.c:1267)
==10087==    by 0x42717C: execode (exec.c:1073)
==10087==    by 0x431299: runshfunc (exec.c:5040)
==10087==    by 0x430E76: doshfunc (exec.c:4920)
==10087==    by 0x4302FB: execshfunc (exec.c:4557)
==10087==    by 0x42D8C1: execcmd (exec.c:3373)
==10087== 
==10087== 
==10087== 2 errors in context 2 of 2:
==10087== Conditional jump or move depends on uninitialised value(s)
==10087==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10087==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10087==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10087==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10087==    by 0x42D8E9: execcmd (exec.c:3378)
==10087==    by 0x428CA0: execpline2 (exec.c:1697)
==10087==    by 0x427FD2: execpline (exec.c:1484)
==10087==    by 0x42779A: execlist (exec.c:1275)
==10087==    by 0x42717C: execode (exec.c:1073)
==10087==    by 0x431299: runshfunc (exec.c:5040)
==10087==    by 0x430E76: doshfunc (exec.c:4920)
==10087==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10087== 
==10087== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10088== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10088-by-pythonnut-on-???
==10088== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10088-by-pythonnut-on-???
==10088== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10088-by-pythonnut-on-???
==10088== 
==10088== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10088== don't want to do, unless you know exactly what you're doing,
==10088== or are doing some strange experiment):
==10088==   /usr/lib/valgrind/../../bin/vgdb --pid=10088 ...command...
==10088== 
==10088== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10088==   /path/to/gdb ./zsh
==10088== and then give GDB the following command
==10088==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10088
==10088== --pid is optional if only one valgrind process is running
==10088== 
--10088-- Caught __NR_exit; running __libc_freeres()
--10088-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10088== 
==10088== HEAP SUMMARY:
==10088==     in use at exit: 3,128,947 bytes in 69,259 blocks
==10088==   total heap usage: 1,595,106 allocs, 1,525,847 frees, 128,837,756 bytes allocated
==10088== 
==10088== Searching for pointers to 69,259 not-freed blocks
--10088--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10088--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10088--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10088--   Scanning root segment: 0x4037000..0x403afff (16384)
--10088--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10088--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10088--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10088--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10088--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10088--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10088--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10088--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10088--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10088--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10088--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10088--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10088--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10088--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10088--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10088--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10088--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10088--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10088--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10088--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10088--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10088--   Scanning root segment: 0x701a000..0x701afff (4096)
--10088--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10088--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10088--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10088--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10088--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10088--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10088--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10088--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10088--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10088--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10088== Checked 4,806,416 bytes
==10088== 
==10088== LEAK SUMMARY:
==10088==    definitely lost: 2,197 bytes in 13 blocks
==10088==    indirectly lost: 6,756 bytes in 7 blocks
==10088==      possibly lost: 0 bytes in 0 blocks
==10088==    still reachable: 3,119,994 bytes in 69,239 blocks
==10088==         suppressed: 0 bytes in 0 blocks
==10088== Rerun with --leak-check=full to see details of leaked memory
==10088== 
==10088== Use --track-origins=yes to see where uninitialised values come from
==10088== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10088== 
==10088== 1 errors in context 1 of 2:
==10088== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10088==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10088==    by 0x488CD0: stringsubst (subst.c:301)
==10088==    by 0x48801B: prefork (subst.c:77)
==10088==    by 0x42B318: execcmd (exec.c:2619)
==10088==    by 0x428CA0: execpline2 (exec.c:1697)
==10088==    by 0x427FD2: execpline (exec.c:1484)
==10088==    by 0x427756: execlist (exec.c:1267)
==10088==    by 0x42717C: execode (exec.c:1073)
==10088==    by 0x431299: runshfunc (exec.c:5040)
==10088==    by 0x430E76: doshfunc (exec.c:4920)
==10088==    by 0x4302FB: execshfunc (exec.c:4557)
==10088==    by 0x42D8C1: execcmd (exec.c:3373)
==10088== 
==10088== 
==10088== 2 errors in context 2 of 2:
==10088== Conditional jump or move depends on uninitialised value(s)
==10088==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10088==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10088==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10088==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10088==    by 0x42D8E9: execcmd (exec.c:3378)
==10088==    by 0x428CA0: execpline2 (exec.c:1697)
==10088==    by 0x427FD2: execpline (exec.c:1484)
==10088==    by 0x42779A: execlist (exec.c:1275)
==10088==    by 0x42717C: execode (exec.c:1073)
==10088==    by 0x431299: runshfunc (exec.c:5040)
==10088==    by 0x430E76: doshfunc (exec.c:4920)
==10088==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10088== 
==10088== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10091-- Caught __NR_exit; running __libc_freeres()
==10091== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10091-by-pythonnut-on-???
==10091== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10091-by-pythonnut-on-???
==10091== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10091-by-pythonnut-on-???
==10091== 
==10091== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10091== don't want to do, unless you know exactly what you're doing,
==10091== or are doing some strange experiment):
==10091==   /usr/lib/valgrind/../../bin/vgdb --pid=10091 ...command...
==10091== 
==10091== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10091==   /path/to/gdb ./zsh
==10091== and then give GDB the following command
==10091==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10091
==10091== --pid is optional if only one valgrind process is running
==10091== 
--10091-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10091== 
==10091== HEAP SUMMARY:
==10091==     in use at exit: 3,128,687 bytes in 69,251 blocks
==10091==   total heap usage: 1,595,264 allocs, 1,526,013 frees, 128,856,323 bytes allocated
==10091== 
==10091== Searching for pointers to 69,251 not-freed blocks
--10091--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10091--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10091--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10091--   Scanning root segment: 0x4037000..0x403afff (16384)
--10091--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10091--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10091--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10091--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10091--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10091--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10091--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10091--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10091--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10091--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10091--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10091--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10091--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10091--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10091--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10091--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10091--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10091--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10091--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10091--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10091--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10091--   Scanning root segment: 0x701a000..0x701afff (4096)
--10091--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10091--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10091--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10091--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10091--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10091--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10091--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10091--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10091--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10091--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10091== Checked 4,806,920 bytes
==10091== 
==10091== LEAK SUMMARY:
==10091==    definitely lost: 2,197 bytes in 13 blocks
==10091==    indirectly lost: 6,756 bytes in 7 blocks
==10091==      possibly lost: 0 bytes in 0 blocks
==10091==    still reachable: 3,119,734 bytes in 69,231 blocks
==10091==         suppressed: 0 bytes in 0 blocks
==10091== Rerun with --leak-check=full to see details of leaked memory
==10091== 
==10091== Use --track-origins=yes to see where uninitialised values come from
==10091== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10091== 
==10091== 1 errors in context 1 of 2:
==10091== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10091==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10091==    by 0x488CD0: stringsubst (subst.c:301)
==10091==    by 0x48801B: prefork (subst.c:77)
==10091==    by 0x42B318: execcmd (exec.c:2619)
==10091==    by 0x428CA0: execpline2 (exec.c:1697)
==10091==    by 0x427FD2: execpline (exec.c:1484)
==10091==    by 0x427756: execlist (exec.c:1267)
==10091==    by 0x42717C: execode (exec.c:1073)
==10091==    by 0x431299: runshfunc (exec.c:5040)
==10091==    by 0x430E76: doshfunc (exec.c:4920)
==10091==    by 0x4302FB: execshfunc (exec.c:4557)
==10091==    by 0x42D8C1: execcmd (exec.c:3373)
==10091== 
==10091== 
==10091== 2 errors in context 2 of 2:
==10091== Conditional jump or move depends on uninitialised value(s)
==10091==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10091==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10091==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10091==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10091==    by 0x42D8E9: execcmd (exec.c:3378)
==10091==    by 0x428CA0: execpline2 (exec.c:1697)
==10091==    by 0x427FD2: execpline (exec.c:1484)
==10091==    by 0x42779A: execlist (exec.c:1275)
==10091==    by 0x42717C: execode (exec.c:1073)
==10091==    by 0x431299: runshfunc (exec.c:5040)
==10091==    by 0x430E76: doshfunc (exec.c:4920)
==10091==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10091== 
==10091== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10092== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10092-by-pythonnut-on-???
==10092== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10092-by-pythonnut-on-???
==10092== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10092-by-pythonnut-on-???
==10092== 
==10092== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10092== don't want to do, unless you know exactly what you're doing,
==10092== or are doing some strange experiment):
==10092==   /usr/lib/valgrind/../../bin/vgdb --pid=10092 ...command...
==10092== 
==10092== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10092==   /path/to/gdb ./zsh
==10092== and then give GDB the following command
==10092==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10092
==10092== --pid is optional if only one valgrind process is running
==10092== 
--10092-- Caught __NR_exit; running __libc_freeres()
--10092-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10092== 
==10092== HEAP SUMMARY:
==10092==     in use at exit: 3,124,847 bytes in 69,174 blocks
==10092==   total heap usage: 1,595,297 allocs, 1,526,123 frees, 128,861,592 bytes allocated
==10092== 
==10092== Searching for pointers to 69,174 not-freed blocks
--10092--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10092--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10092--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10092--   Scanning root segment: 0x4037000..0x403afff (16384)
--10092--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10092--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10092--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10092--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10092--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10092--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10092--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10092--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10092--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10092--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10092--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10092--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10092--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10092--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10092--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10092--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10092--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10092--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10092--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10092--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10092--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10092--   Scanning root segment: 0x701a000..0x701afff (4096)
--10092--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10092--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10092--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10092--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10092--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10092--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10092--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10092--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10092--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10092--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10092== Checked 4,800,528 bytes
==10092== 
==10092== LEAK SUMMARY:
==10092==    definitely lost: 2,197 bytes in 13 blocks
==10092==    indirectly lost: 6,756 bytes in 7 blocks
==10092==      possibly lost: 0 bytes in 0 blocks
==10092==    still reachable: 3,115,894 bytes in 69,154 blocks
==10092==         suppressed: 0 bytes in 0 blocks
==10092== Rerun with --leak-check=full to see details of leaked memory
==10092== 
==10092== Use --track-origins=yes to see where uninitialised values come from
==10092== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10092== 
==10092== 1 errors in context 1 of 2:
==10092== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10092==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10092==    by 0x488CD0: stringsubst (subst.c:301)
==10092==    by 0x48801B: prefork (subst.c:77)
==10092==    by 0x42B318: execcmd (exec.c:2619)
==10092==    by 0x428CA0: execpline2 (exec.c:1697)
==10092==    by 0x427FD2: execpline (exec.c:1484)
==10092==    by 0x427756: execlist (exec.c:1267)
==10092==    by 0x42717C: execode (exec.c:1073)
==10092==    by 0x431299: runshfunc (exec.c:5040)
==10092==    by 0x430E76: doshfunc (exec.c:4920)
==10092==    by 0x4302FB: execshfunc (exec.c:4557)
==10092==    by 0x42D8C1: execcmd (exec.c:3373)
==10092== 
==10092== 
==10092== 2 errors in context 2 of 2:
==10092== Conditional jump or move depends on uninitialised value(s)
==10092==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10092==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10092==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10092==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10092==    by 0x42D8E9: execcmd (exec.c:3378)
==10092==    by 0x428CA0: execpline2 (exec.c:1697)
==10092==    by 0x427FD2: execpline (exec.c:1484)
==10092==    by 0x42779A: execlist (exec.c:1275)
==10092==    by 0x42717C: execode (exec.c:1073)
==10092==    by 0x431299: runshfunc (exec.c:5040)
==10092==    by 0x430E76: doshfunc (exec.c:4920)
==10092==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10092== 
==10092== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10093== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10093-by-pythonnut-on-???
==10093== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10093-by-pythonnut-on-???
==10093== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10093-by-pythonnut-on-???
==10093== 
==10093== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10093== don't want to do, unless you know exactly what you're doing,
==10093== or are doing some strange experiment):
==10093==   /usr/lib/valgrind/../../bin/vgdb --pid=10093 ...command...
==10093== 
==10093== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10093==   /path/to/gdb ./zsh
==10093== and then give GDB the following command
==10093==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10093
==10093== --pid is optional if only one valgrind process is running
==10093== 
--10093-- Caught __NR_exit; running __libc_freeres()
--10093-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10093== 
==10093== HEAP SUMMARY:
==10093==     in use at exit: 3,123,579 bytes in 69,168 blocks
==10093==   total heap usage: 1,597,387 allocs, 1,528,219 frees, 128,978,445 bytes allocated
==10093== 
==10093== Searching for pointers to 69,168 not-freed blocks
--10093--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10093--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10093--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10093--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10093--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10093--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10093--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10093--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10093--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10093--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10093--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10093--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10093--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10093--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10093--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10093--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10093--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10093--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10093--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10093--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10093--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10093--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10093--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10093--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10093--   Scanning root segment: 0x701a000..0x701afff (4096)
--10093--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10093--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10093--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10093--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10093--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10093--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10093--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10093--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10093--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10093--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10093== Checked 4,785,608 bytes
==10093== 
==10093== LEAK SUMMARY:
==10093==    definitely lost: 2,197 bytes in 13 blocks
==10093==    indirectly lost: 6,756 bytes in 7 blocks
==10093==      possibly lost: 0 bytes in 0 blocks
==10093==    still reachable: 3,114,626 bytes in 69,148 blocks
==10093==         suppressed: 0 bytes in 0 blocks
==10093== Rerun with --leak-check=full to see details of leaked memory
==10093== 
==10093== Use --track-origins=yes to see where uninitialised values come from
==10093== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10093== 
==10093== 1 errors in context 1 of 2:
==10093== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10093==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10093==    by 0x488CD0: stringsubst (subst.c:301)
==10093==    by 0x48801B: prefork (subst.c:77)
==10093==    by 0x42B318: execcmd (exec.c:2619)
==10093==    by 0x428CA0: execpline2 (exec.c:1697)
==10093==    by 0x427FD2: execpline (exec.c:1484)
==10093==    by 0x427756: execlist (exec.c:1267)
==10093==    by 0x42717C: execode (exec.c:1073)
==10093==    by 0x431299: runshfunc (exec.c:5040)
==10093==    by 0x430E76: doshfunc (exec.c:4920)
==10093==    by 0x4302FB: execshfunc (exec.c:4557)
==10093==    by 0x42D8C1: execcmd (exec.c:3373)
==10093== 
==10093== 
==10093== 2 errors in context 2 of 2:
==10093== Conditional jump or move depends on uninitialised value(s)
==10093==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10093==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10093==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10093==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10093==    by 0x42D8E9: execcmd (exec.c:3378)
==10093==    by 0x428CA0: execpline2 (exec.c:1697)
==10093==    by 0x427FD2: execpline (exec.c:1484)
==10093==    by 0x42779A: execlist (exec.c:1275)
==10093==    by 0x42717C: execode (exec.c:1073)
==10093==    by 0x431299: runshfunc (exec.c:5040)
==10093==    by 0x430E76: doshfunc (exec.c:4920)
==10093==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10093== 
==10093== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10094-- Caught __NR_exit; running __libc_freeres()
==10094== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10094-by-pythonnut-on-???
==10094== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10094-by-pythonnut-on-???
==10094== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10094-by-pythonnut-on-???
==10094== 
==10094== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10094== don't want to do, unless you know exactly what you're doing,
==10094== or are doing some strange experiment):
==10094==   /usr/lib/valgrind/../../bin/vgdb --pid=10094 ...command...
==10094== 
==10094== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10094==   /path/to/gdb ./zsh
==10094== and then give GDB the following command
==10094==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10094
==10094== --pid is optional if only one valgrind process is running
==10094== 
--10094-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10094== 
==10094== HEAP SUMMARY:
==10094==     in use at exit: 3,123,643 bytes in 69,168 blocks
==10094==   total heap usage: 1,597,393 allocs, 1,528,225 frees, 128,987,021 bytes allocated
==10094== 
==10094== Searching for pointers to 69,168 not-freed blocks
--10094--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10094--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10094--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10094--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10094--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10094--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10094--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10094--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10094--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10094--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10094--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10094--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10094--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10094--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10094--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10094--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10094--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10094--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10094--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10094--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10094--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10094--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10094--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10094--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10094--   Scanning root segment: 0x701a000..0x701afff (4096)
--10094--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10094--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10094--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10094--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10094--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10094--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10094--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10094--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10094--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10094--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10094== Checked 4,787,704 bytes
==10094== 
==10094== LEAK SUMMARY:
==10094==    definitely lost: 2,197 bytes in 13 blocks
==10094==    indirectly lost: 6,756 bytes in 7 blocks
==10094==      possibly lost: 0 bytes in 0 blocks
==10094==    still reachable: 3,114,690 bytes in 69,148 blocks
==10094==         suppressed: 0 bytes in 0 blocks
==10094== Rerun with --leak-check=full to see details of leaked memory
==10094== 
==10094== Use --track-origins=yes to see where uninitialised values come from
==10094== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10094== 
==10094== 1 errors in context 1 of 2:
==10094== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10094==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10094==    by 0x488CD0: stringsubst (subst.c:301)
==10094==    by 0x48801B: prefork (subst.c:77)
==10094==    by 0x42B318: execcmd (exec.c:2619)
==10094==    by 0x428CA0: execpline2 (exec.c:1697)
==10094==    by 0x427FD2: execpline (exec.c:1484)
==10094==    by 0x427756: execlist (exec.c:1267)
==10094==    by 0x42717C: execode (exec.c:1073)
==10094==    by 0x431299: runshfunc (exec.c:5040)
==10094==    by 0x430E76: doshfunc (exec.c:4920)
==10094==    by 0x4302FB: execshfunc (exec.c:4557)
==10094==    by 0x42D8C1: execcmd (exec.c:3373)
==10094== 
==10094== 
==10094== 2 errors in context 2 of 2:
==10094== Conditional jump or move depends on uninitialised value(s)
==10094==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10094==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10094==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10094==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10094==    by 0x42D8E9: execcmd (exec.c:3378)
==10094==    by 0x428CA0: execpline2 (exec.c:1697)
==10094==    by 0x427FD2: execpline (exec.c:1484)
==10094==    by 0x42779A: execlist (exec.c:1275)
==10094==    by 0x42717C: execode (exec.c:1073)
==10094==    by 0x431299: runshfunc (exec.c:5040)
==10094==    by 0x430E76: doshfunc (exec.c:4920)
==10094==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10094== 
==10094== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10095== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10095-by-pythonnut-on-???
==10095== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10095-by-pythonnut-on-???
==10095== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10095-by-pythonnut-on-???
==10095== 
==10095== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10095== don't want to do, unless you know exactly what you're doing,
==10095== or are doing some strange experiment):
==10095==   /usr/lib/valgrind/../../bin/vgdb --pid=10095 ...command...
==10095== 
==10095== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10095==   /path/to/gdb ./zsh
==10095== and then give GDB the following command
==10095==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10095
==10095== --pid is optional if only one valgrind process is running
==10095== 
==10096== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10096-by-pythonnut-on-???
==10096== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10096-by-pythonnut-on-???
==10096== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10096-by-pythonnut-on-???
==10096== 
==10096== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10096== don't want to do, unless you know exactly what you're doing,
==10096== or are doing some strange experiment):
==10096==   /usr/lib/valgrind/../../bin/vgdb --pid=10096 ...command...
==10096== 
==10096== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10096==   /path/to/gdb ./zsh
==10096== and then give GDB the following command
==10096==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10096
==10096== --pid is optional if only one valgrind process is running
==10096== 
==10097== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10097-by-pythonnut-on-???
==10097== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10097-by-pythonnut-on-???
==10097== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10097-by-pythonnut-on-???
==10097== 
==10097== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10097== don't want to do, unless you know exactly what you're doing,
==10097== or are doing some strange experiment):
==10097==   /usr/lib/valgrind/../../bin/vgdb --pid=10097 ...command...
==10097== 
==10097== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10097==   /path/to/gdb ./zsh
==10097== and then give GDB the following command
==10097==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10097
==10097== --pid is optional if only one valgrind process is running
==10097== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--10097-- Caught __NR_exit; running __libc_freeres()
--10097-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10097== 
==10097== HEAP SUMMARY:
==10097==     in use at exit: 3,127,462 bytes in 69,235 blocks
==10097==   total heap usage: 1,597,554 allocs, 1,528,319 frees, 129,016,345 bytes allocated
==10097== 
==10097== Searching for pointers to 69,235 not-freed blocks
--10097--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10097--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10097--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10097--   Scanning root segment: 0x4037000..0x403afff (16384)
--10097--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10097--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10097--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10097--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10097--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10097--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10097--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10097--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10097--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10097--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10097--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10097--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10097--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10097--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10097--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10097--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10097--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10097--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10097--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10097--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10097--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10097--   Scanning root segment: 0x701a000..0x701afff (4096)
--10097--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10097--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10097--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10097--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10097--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10097--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10097--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10097--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10097--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10097--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10097== Checked 4,810,048 bytes
==10097== 
==10097== LEAK SUMMARY:
==10097==    definitely lost: 2,197 bytes in 13 blocks
==10097==    indirectly lost: 6,756 bytes in 7 blocks
==10097==      possibly lost: 0 bytes in 0 blocks
==10097==    still reachable: 3,118,509 bytes in 69,215 blocks
==10097==         suppressed: 0 bytes in 0 blocks
==10097== Rerun with --leak-check=full to see details of leaked memory
==10097== 
==10097== Use --track-origins=yes to see where uninitialised values come from
==10097== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10097== 
==10097== 1 errors in context 1 of 2:
==10097== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10097==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10097==    by 0x488CD0: stringsubst (subst.c:301)
==10097==    by 0x48801B: prefork (subst.c:77)
==10097==    by 0x42B318: execcmd (exec.c:2619)
==10097==    by 0x428CA0: execpline2 (exec.c:1697)
==10097==    by 0x427FD2: execpline (exec.c:1484)
==10097==    by 0x427756: execlist (exec.c:1267)
==10097==    by 0x42717C: execode (exec.c:1073)
==10097==    by 0x431299: runshfunc (exec.c:5040)
==10097==    by 0x430E76: doshfunc (exec.c:4920)
==10097==    by 0x4302FB: execshfunc (exec.c:4557)
==10097==    by 0x42D8C1: execcmd (exec.c:3373)
==10097== 
==10097== 
==10097== 2 errors in context 2 of 2:
==10097== Conditional jump or move depends on uninitialised value(s)
==10097==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10097==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10097==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10097==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10097==    by 0x42D8E9: execcmd (exec.c:3378)
==10097==    by 0x428CA0: execpline2 (exec.c:1697)
==10097==    by 0x427FD2: execpline (exec.c:1484)
==10097==    by 0x42779A: execlist (exec.c:1275)
==10097==    by 0x42717C: execode (exec.c:1073)
==10097==    by 0x431299: runshfunc (exec.c:5040)
==10097==    by 0x430E76: doshfunc (exec.c:4920)
==10097==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10097== 
==10097== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10102== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10102-by-pythonnut-on-???
==10102== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10102-by-pythonnut-on-???
==10102== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10102-by-pythonnut-on-???
==10102== 
==10102== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10102== don't want to do, unless you know exactly what you're doing,
==10102== or are doing some strange experiment):
==10102==   /usr/lib/valgrind/../../bin/vgdb --pid=10102 ...command...
==10102== 
==10102== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10102==   /path/to/gdb ./zsh
==10102== and then give GDB the following command
==10102==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10102
==10102== --pid is optional if only one valgrind process is running
==10102== 
--10102-- Caught __NR_exit; running __libc_freeres()
==10103== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10103-by-pythonnut-on-???
==10103== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10103-by-pythonnut-on-???
==10103== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10103-by-pythonnut-on-???
==10103== 
==10103== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10103== don't want to do, unless you know exactly what you're doing,
==10103== or are doing some strange experiment):
==10103==   /usr/lib/valgrind/../../bin/vgdb --pid=10103 ...command...
==10103== 
==10103== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10103==   /path/to/gdb ./zsh
==10103== and then give GDB the following command
==10103==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10103
==10103== --pid is optional if only one valgrind process is running
==10103== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--10102-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10102== 
==10102== HEAP SUMMARY:
==10102==     in use at exit: 3,164,329 bytes in 69,242 blocks
==10102==   total heap usage: 1,597,561 allocs, 1,528,319 frees, 129,056,268 bytes allocated
==10102== 
==10102== Searching for pointers to 69,242 not-freed blocks
--10102--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10102--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10102--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10102--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10102--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10102--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10102--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10102--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10102--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10102--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10102--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10102--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10102--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10102--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10102--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10102--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10102--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10102--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10102--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10102--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10102--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10102--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10102--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10102--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10102--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10102--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10102--   Scanning root segment: 0x701a000..0x701afff (4096)
--10102--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10102--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10102--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10102--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10102--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10102--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10102--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10102--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10102--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10102--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10102== Checked 4,921,864 bytes
==10102== 
==10102== LEAK SUMMARY:
==10102==    definitely lost: 2,197 bytes in 13 blocks
==10102==    indirectly lost: 6,756 bytes in 7 blocks
==10102==      possibly lost: 0 bytes in 0 blocks
==10102==    still reachable: 3,155,376 bytes in 69,222 blocks
==10102==         suppressed: 0 bytes in 0 blocks
==10102== Rerun with --leak-check=full to see details of leaked memory
==10102== 
==10102== Use --track-origins=yes to see where uninitialised values come from
==10102== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10102== 
==10102== 1 errors in context 1 of 2:
==10102== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10102==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10102==    by 0x488CD0: stringsubst (subst.c:301)
==10102==    by 0x48801B: prefork (subst.c:77)
==10102==    by 0x42B318: execcmd (exec.c:2619)
==10102==    by 0x428CA0: execpline2 (exec.c:1697)
==10102==    by 0x427FD2: execpline (exec.c:1484)
==10102==    by 0x427756: execlist (exec.c:1267)
==10102==    by 0x42717C: execode (exec.c:1073)
==10102==    by 0x431299: runshfunc (exec.c:5040)
==10102==    by 0x430E76: doshfunc (exec.c:4920)
==10102==    by 0x4302FB: execshfunc (exec.c:4557)
==10102==    by 0x42D8C1: execcmd (exec.c:3373)
==10102== 
==10102== 
==10102== 2 errors in context 2 of 2:
==10102== Conditional jump or move depends on uninitialised value(s)
==10102==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10102==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10102==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10102==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10102==    by 0x42D8E9: execcmd (exec.c:3378)
==10102==    by 0x428CA0: execpline2 (exec.c:1697)
==10102==    by 0x427FD2: execpline (exec.c:1484)
==10102==    by 0x42779A: execlist (exec.c:1275)
==10102==    by 0x42717C: execode (exec.c:1073)
==10102==    by 0x431299: runshfunc (exec.c:5040)
==10102==    by 0x430E76: doshfunc (exec.c:4920)
==10102==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10102== 
==10102== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10101== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10101-by-pythonnut-on-???
==10101== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10101-by-pythonnut-on-???
==10101== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10101-by-pythonnut-on-???
==10101== 
==10101== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10101== don't want to do, unless you know exactly what you're doing,
==10101== or are doing some strange experiment):
==10101==   /usr/lib/valgrind/../../bin/vgdb --pid=10101 ...command...
==10101== 
==10101== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10101==   /path/to/gdb ./zsh
==10101== and then give GDB the following command
==10101==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10101
==10101== --pid is optional if only one valgrind process is running
==10101== 
--10101-- Caught __NR_exit; running __libc_freeres()
--10101-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10101== 
==10101== HEAP SUMMARY:
==10101==     in use at exit: 3,164,297 bytes in 69,239 blocks
==10101==   total heap usage: 1,597,564 allocs, 1,528,325 frees, 129,056,876 bytes allocated
==10101== 
==10101== Searching for pointers to 69,239 not-freed blocks
--10101--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10101--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10101--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10101--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10101--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10101--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10101--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10101--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10101--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10101--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10101--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10101--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10101--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10101--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10101--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10101--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10101--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10101--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10101--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10101--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10101--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10101--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10101--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10101--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10101--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10101--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10101--   Scanning root segment: 0x701a000..0x701afff (4096)
--10101--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10101--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10101--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10101--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10101--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10101--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10101--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10101--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10101--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10101--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10101== Checked 4,921,192 bytes
==10101== 
==10101== LEAK SUMMARY:
==10101==    definitely lost: 2,197 bytes in 13 blocks
==10101==    indirectly lost: 6,756 bytes in 7 blocks
==10101==      possibly lost: 0 bytes in 0 blocks
==10101==    still reachable: 3,155,344 bytes in 69,219 blocks
==10101==         suppressed: 0 bytes in 0 blocks
==10101== Rerun with --leak-check=full to see details of leaked memory
==10101== 
==10101== Use --track-origins=yes to see where uninitialised values come from
==10101== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10101== 
==10101== 1 errors in context 1 of 2:
==10101== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10101==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10101==    by 0x488CD0: stringsubst (subst.c:301)
==10101==    by 0x48801B: prefork (subst.c:77)
==10101==    by 0x42B318: execcmd (exec.c:2619)
==10101==    by 0x428CA0: execpline2 (exec.c:1697)
==10101==    by 0x427FD2: execpline (exec.c:1484)
==10101==    by 0x427756: execlist (exec.c:1267)
==10101==    by 0x42717C: execode (exec.c:1073)
==10101==    by 0x431299: runshfunc (exec.c:5040)
==10101==    by 0x430E76: doshfunc (exec.c:4920)
==10101==    by 0x4302FB: execshfunc (exec.c:4557)
==10101==    by 0x42D8C1: execcmd (exec.c:3373)
==10101== 
==10101== 
==10101== 2 errors in context 2 of 2:
==10101== Conditional jump or move depends on uninitialised value(s)
==10101==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10101==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10101==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10101==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10101==    by 0x42D8E9: execcmd (exec.c:3378)
==10101==    by 0x428CA0: execpline2 (exec.c:1697)
==10101==    by 0x427FD2: execpline (exec.c:1484)
==10101==    by 0x42779A: execlist (exec.c:1275)
==10101==    by 0x42717C: execode (exec.c:1073)
==10101==    by 0x431299: runshfunc (exec.c:5040)
==10101==    by 0x430E76: doshfunc (exec.c:4920)
==10101==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10101== 
==10101== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10104== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10104-by-pythonnut-on-???
==10104== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10104-by-pythonnut-on-???
==10104== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10104-by-pythonnut-on-???
==10104== 
==10104== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10104== don't want to do, unless you know exactly what you're doing,
==10104== or are doing some strange experiment):
==10104==   /usr/lib/valgrind/../../bin/vgdb --pid=10104 ...command...
==10104== 
==10104== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10104==   /path/to/gdb ./zsh
==10104== and then give GDB the following command
==10104==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10104
==10104== --pid is optional if only one valgrind process is running
==10104== 
==10105== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10105-by-pythonnut-on-???
==10105== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10105-by-pythonnut-on-???
==10105== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10105-by-pythonnut-on-???
==10105== 
==10105== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10105== don't want to do, unless you know exactly what you're doing,
==10105== or are doing some strange experiment):
==10105==   /usr/lib/valgrind/../../bin/vgdb --pid=10105 ...command...
==10105== 
==10105== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10105==   /path/to/gdb ./zsh
==10105== and then give GDB the following command
==10105==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10105
==10105== --pid is optional if only one valgrind process is running
==10105== 
--10105-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--10105-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10105== 
==10105== HEAP SUMMARY:
==10105==     in use at exit: 3,201,015 bytes in 69,245 blocks
==10105==   total heap usage: 1,597,570 allocs, 1,528,325 frees, 129,095,111 bytes allocated
==10105== 
==10105== Searching for pointers to 69,245 not-freed blocks
--10105--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10105--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10105--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10105--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10105--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10105--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10105--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10105--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10105--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10105--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10105--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10105--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10105--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10105--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10105--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10105--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10105--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10105--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10105--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10105--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10105--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10105--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10105--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10105--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10105--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10105--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10105--   Scanning root segment: 0x701a000..0x701afff (4096)
--10105--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10105--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10105--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10105--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10105--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10105--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10105--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10105--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10105--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10105--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10105== Checked 4,995,392 bytes
==10105== 
==10105== LEAK SUMMARY:
==10105==    definitely lost: 2,197 bytes in 13 blocks
==10105==    indirectly lost: 6,756 bytes in 7 blocks
==10105==      possibly lost: 0 bytes in 0 blocks
==10105==    still reachable: 3,192,062 bytes in 69,225 blocks
==10105==         suppressed: 0 bytes in 0 blocks
==10105== Rerun with --leak-check=full to see details of leaked memory
==10105== 
==10105== Use --track-origins=yes to see where uninitialised values come from
==10105== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10105== 
==10105== 1 errors in context 1 of 2:
==10105== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10105==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10105==    by 0x488CD0: stringsubst (subst.c:301)
==10105==    by 0x48801B: prefork (subst.c:77)
==10105==    by 0x42B318: execcmd (exec.c:2619)
==10105==    by 0x428CA0: execpline2 (exec.c:1697)
==10105==    by 0x427FD2: execpline (exec.c:1484)
==10105==    by 0x427756: execlist (exec.c:1267)
==10105==    by 0x42717C: execode (exec.c:1073)
==10105==    by 0x431299: runshfunc (exec.c:5040)
==10105==    by 0x430E76: doshfunc (exec.c:4920)
==10105==    by 0x4302FB: execshfunc (exec.c:4557)
==10105==    by 0x42D8C1: execcmd (exec.c:3373)
==10105== 
==10105== 
==10105== 2 errors in context 2 of 2:
==10105== Conditional jump or move depends on uninitialised value(s)
==10105==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10105==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10105==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10105==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10105==    by 0x42D8E9: execcmd (exec.c:3378)
==10105==    by 0x428CA0: execpline2 (exec.c:1697)
==10105==    by 0x427FD2: execpline (exec.c:1484)
==10105==    by 0x42779A: execlist (exec.c:1275)
==10105==    by 0x42717C: execode (exec.c:1073)
==10105==    by 0x431299: runshfunc (exec.c:5040)
==10105==    by 0x430E76: doshfunc (exec.c:4920)
==10105==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10105== 
==10105== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10104-- Caught __NR_exit; running __libc_freeres()
--10104-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10104== 
==10104== HEAP SUMMARY:
==10104==     in use at exit: 3,164,375 bytes in 69,242 blocks
==10104==   total heap usage: 1,597,573 allocs, 1,528,331 frees, 129,095,687 bytes allocated
==10104== 
==10104== Searching for pointers to 69,242 not-freed blocks
--10104--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10104--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10104--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10104--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10104--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10104--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10104--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10104--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10104--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10104--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10104--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10104--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10104--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10104--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10104--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10104--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10104--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10104--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10104--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10104--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10104--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10104--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10104--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10104--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10104--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10104--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10104--   Scanning root segment: 0x701a000..0x701afff (4096)
--10104--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10104--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10104--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10104--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10104--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10104--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10104--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10104--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10104--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10104--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10104== Checked 4,958,136 bytes
==10104== 
==10104== LEAK SUMMARY:
==10104==    definitely lost: 2,197 bytes in 13 blocks
==10104==    indirectly lost: 6,756 bytes in 7 blocks
==10104==      possibly lost: 0 bytes in 0 blocks
==10104==    still reachable: 3,155,422 bytes in 69,222 blocks
==10104==         suppressed: 0 bytes in 0 blocks
==10104== Rerun with --leak-check=full to see details of leaked memory
==10104== 
==10104== Use --track-origins=yes to see where uninitialised values come from
==10104== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10104== 
==10104== 1 errors in context 1 of 2:
==10104== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10104==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10104==    by 0x488CD0: stringsubst (subst.c:301)
==10104==    by 0x48801B: prefork (subst.c:77)
==10104==    by 0x42B318: execcmd (exec.c:2619)
==10104==    by 0x428CA0: execpline2 (exec.c:1697)
==10104==    by 0x427FD2: execpline (exec.c:1484)
==10104==    by 0x427756: execlist (exec.c:1267)
==10104==    by 0x42717C: execode (exec.c:1073)
==10104==    by 0x431299: runshfunc (exec.c:5040)
==10104==    by 0x430E76: doshfunc (exec.c:4920)
==10104==    by 0x4302FB: execshfunc (exec.c:4557)
==10104==    by 0x42D8C1: execcmd (exec.c:3373)
==10104== 
==10104== 
==10104== 2 errors in context 2 of 2:
==10104== Conditional jump or move depends on uninitialised value(s)
==10104==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10104==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10104==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10104==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10104==    by 0x42D8E9: execcmd (exec.c:3378)
==10104==    by 0x428CA0: execpline2 (exec.c:1697)
==10104==    by 0x427FD2: execpline (exec.c:1484)
==10104==    by 0x42779A: execlist (exec.c:1275)
==10104==    by 0x42717C: execode (exec.c:1073)
==10104==    by 0x431299: runshfunc (exec.c:5040)
==10104==    by 0x430E76: doshfunc (exec.c:4920)
==10104==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10104== 
==10104== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10107== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10107-by-pythonnut-on-???
==10107== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10107-by-pythonnut-on-???
==10107== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10107-by-pythonnut-on-???
==10107== 
==10107== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10107== don't want to do, unless you know exactly what you're doing,
==10107== or are doing some strange experiment):
==10107==   /usr/lib/valgrind/../../bin/vgdb --pid=10107 ...command...
==10107== 
==10107== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10107==   /path/to/gdb ./zsh
==10107== and then give GDB the following command
==10107==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10107
==10107== --pid is optional if only one valgrind process is running
==10107== 
==10108== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10108-by-pythonnut-on-???
==10108== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10108-by-pythonnut-on-???
==10108== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10108-by-pythonnut-on-???
==10108== 
==10108== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10108== don't want to do, unless you know exactly what you're doing,
==10108== or are doing some strange experiment):
==10108==   /usr/lib/valgrind/../../bin/vgdb --pid=10108 ...command...
==10108== 
==10108== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10108==   /path/to/gdb ./zsh
==10108== and then give GDB the following command
==10108==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10108
==10108== --pid is optional if only one valgrind process is running
==10108== 
--10108-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA64C,  len 4
--10108-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10108== 
==10108== HEAP SUMMARY:
==10108==     in use at exit: 3,201,101 bytes in 69,248 blocks
==10108==   total heap usage: 1,597,583 allocs, 1,528,335 frees, 129,100,397 bytes allocated
==10108== 
==10108== Searching for pointers to 69,248 not-freed blocks
--10108--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10108--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10108--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10108--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10108--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10108--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10108--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10108--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10108--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10108--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10108--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10108--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10108--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10108--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10108--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10108--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10108--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10108--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10108--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10108--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10108--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10108--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10108--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10108--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10108--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10108--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10108--   Scanning root segment: 0x701a000..0x701afff (4096)
--10108--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10108--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10108--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10108--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10108--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10108--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10108--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10108--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10108--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10108--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10108== Checked 4,995,744 bytes
==10108== 
==10108== LEAK SUMMARY:
==10108==    definitely lost: 2,197 bytes in 13 blocks
==10108==    indirectly lost: 6,756 bytes in 7 blocks
==10108==      possibly lost: 0 bytes in 0 blocks
==10108==    still reachable: 3,192,148 bytes in 69,228 blocks
==10108==         suppressed: 0 bytes in 0 blocks
==10108== Rerun with --leak-check=full to see details of leaked memory
==10108== 
==10108== Use --track-origins=yes to see where uninitialised values come from
==10108== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10108== 
==10108== 1 errors in context 1 of 2:
==10108== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10108==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10108==    by 0x488CD0: stringsubst (subst.c:301)
==10108==    by 0x48801B: prefork (subst.c:77)
==10108==    by 0x42B318: execcmd (exec.c:2619)
==10108==    by 0x428CA0: execpline2 (exec.c:1697)
==10108==    by 0x427FD2: execpline (exec.c:1484)
==10108==    by 0x427756: execlist (exec.c:1267)
==10108==    by 0x42717C: execode (exec.c:1073)
==10108==    by 0x431299: runshfunc (exec.c:5040)
==10108==    by 0x430E76: doshfunc (exec.c:4920)
==10108==    by 0x4302FB: execshfunc (exec.c:4557)
==10108==    by 0x42D8C1: execcmd (exec.c:3373)
==10108== 
==10108== 
==10108== 2 errors in context 2 of 2:
==10108== Conditional jump or move depends on uninitialised value(s)
==10108==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10108==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10108==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10108==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10108==    by 0x42D8E9: execcmd (exec.c:3378)
==10108==    by 0x428CA0: execpline2 (exec.c:1697)
==10108==    by 0x427FD2: execpline (exec.c:1484)
==10108==    by 0x42779A: execlist (exec.c:1275)
==10108==    by 0x42717C: execode (exec.c:1073)
==10108==    by 0x431299: runshfunc (exec.c:5040)
==10108==    by 0x430E76: doshfunc (exec.c:4920)
==10108==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10108== 
==10108== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10107-- Caught __NR_exit; running __libc_freeres()
--10107-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10107== 
==10107== HEAP SUMMARY:
==10107==     in use at exit: 3,164,461 bytes in 69,245 blocks
==10107==   total heap usage: 1,597,586 allocs, 1,528,341 frees, 129,100,973 bytes allocated
==10107== 
==10107== Searching for pointers to 69,245 not-freed blocks
--10107--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10107--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10107--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10107--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10107--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10107--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10107--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10107--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10107--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10107--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10107--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10107--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10107--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10107--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10107--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10107--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10107--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10107--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10107--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10107--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10107--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10107--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10107--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10107--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10107--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10107--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10107--   Scanning root segment: 0x701a000..0x701afff (4096)
--10107--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10107--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10107--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10107--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10107--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10107--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10107--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10107--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10107--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10107--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10107== Checked 4,958,488 bytes
==10107== 
==10107== LEAK SUMMARY:
==10107==    definitely lost: 2,197 bytes in 13 blocks
==10107==    indirectly lost: 6,756 bytes in 7 blocks
==10107==      possibly lost: 0 bytes in 0 blocks
==10107==    still reachable: 3,155,508 bytes in 69,225 blocks
==10107==         suppressed: 0 bytes in 0 blocks
==10107== Rerun with --leak-check=full to see details of leaked memory
==10107== 
==10107== Use --track-origins=yes to see where uninitialised values come from
==10107== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10107== 
==10107== 1 errors in context 1 of 2:
==10107== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10107==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10107==    by 0x488CD0: stringsubst (subst.c:301)
==10107==    by 0x48801B: prefork (subst.c:77)
==10107==    by 0x42B318: execcmd (exec.c:2619)
==10107==    by 0x428CA0: execpline2 (exec.c:1697)
==10107==    by 0x427FD2: execpline (exec.c:1484)
==10107==    by 0x427756: execlist (exec.c:1267)
==10107==    by 0x42717C: execode (exec.c:1073)
==10107==    by 0x431299: runshfunc (exec.c:5040)
==10107==    by 0x430E76: doshfunc (exec.c:4920)
==10107==    by 0x4302FB: execshfunc (exec.c:4557)
==10107==    by 0x42D8C1: execcmd (exec.c:3373)
==10107== 
==10107== 
==10107== 2 errors in context 2 of 2:
==10107== Conditional jump or move depends on uninitialised value(s)
==10107==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10107==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10107==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10107==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10107==    by 0x42D8E9: execcmd (exec.c:3378)
==10107==    by 0x428CA0: execpline2 (exec.c:1697)
==10107==    by 0x427FD2: execpline (exec.c:1484)
==10107==    by 0x42779A: execlist (exec.c:1275)
==10107==    by 0x42717C: execode (exec.c:1073)
==10107==    by 0x431299: runshfunc (exec.c:5040)
==10107==    by 0x430E76: doshfunc (exec.c:4920)
==10107==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10107== 
==10107== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10112== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10112-by-pythonnut-on-???
==10112== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10112-by-pythonnut-on-???
==10112== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10112-by-pythonnut-on-???
==10112== 
==10112== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10112== don't want to do, unless you know exactly what you're doing,
==10112== or are doing some strange experiment):
==10112==   /usr/lib/valgrind/../../bin/vgdb --pid=10112 ...command...
==10112== 
==10112== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10112==   /path/to/gdb ./zsh
==10112== and then give GDB the following command
==10112==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10112
==10112== --pid is optional if only one valgrind process is running
==10112== 
--10113-- Caught __NR_exit; running __libc_freeres()
==10113== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10113-by-pythonnut-on-???
==10113== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10113-by-pythonnut-on-???
==10113== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10113-by-pythonnut-on-???
==10113== 
==10113== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10113== don't want to do, unless you know exactly what you're doing,
==10113== or are doing some strange experiment):
==10113==   /usr/lib/valgrind/../../bin/vgdb --pid=10113 ...command...
==10113== 
==10113== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10113==   /path/to/gdb ./zsh
==10113== and then give GDB the following command
==10113==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10113
==10113== --pid is optional if only one valgrind process is running
==10113== 
client request: code 4d430005,  addr 0xFFEFE9B1C,  len 4
--10113-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10113== 
==10113== HEAP SUMMARY:
==10113==     in use at exit: 3,164,525 bytes in 69,248 blocks
==10113==   total heap usage: 1,597,596 allocs, 1,528,348 frees, 129,070,534 bytes allocated
==10113== 
==10113== Searching for pointers to 69,248 not-freed blocks
--10113--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10113--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10113--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10113--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10113--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10113--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10113--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10113--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10113--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10113--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10113--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10113--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10113--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10113--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10113--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10113--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10113--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10113--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10113--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10113--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10113--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10113--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10113--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10113--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10113--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10113--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10113--   Scanning root segment: 0x701a000..0x701afff (4096)
--10113--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10113--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10113--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10113--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10113--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10113--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10113--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10113--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10113--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10113--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10113== Checked 4,923,136 bytes
==10113== 
==10113== LEAK SUMMARY:
==10113==    definitely lost: 2,197 bytes in 13 blocks
==10113==    indirectly lost: 6,756 bytes in 7 blocks
==10113==      possibly lost: 0 bytes in 0 blocks
==10113==    still reachable: 3,155,572 bytes in 69,228 blocks
==10113==         suppressed: 0 bytes in 0 blocks
==10113== Rerun with --leak-check=full to see details of leaked memory
==10113== 
==10113== Use --track-origins=yes to see where uninitialised values come from
==10113== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10113== 
==10113== 1 errors in context 1 of 2:
==10113== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10113==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10113==    by 0x488CD0: stringsubst (subst.c:301)
==10113==    by 0x48801B: prefork (subst.c:77)
==10113==    by 0x42B318: execcmd (exec.c:2619)
==10113==    by 0x428CA0: execpline2 (exec.c:1697)
==10113==    by 0x427FD2: execpline (exec.c:1484)
==10113==    by 0x427756: execlist (exec.c:1267)
==10113==    by 0x42717C: execode (exec.c:1073)
==10113==    by 0x431299: runshfunc (exec.c:5040)
==10113==    by 0x430E76: doshfunc (exec.c:4920)
==10113==    by 0x4302FB: execshfunc (exec.c:4557)
==10113==    by 0x42D8C1: execcmd (exec.c:3373)
==10113== 
==10113== 
==10113== 2 errors in context 2 of 2:
==10113== Conditional jump or move depends on uninitialised value(s)
==10113==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10113==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10113==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10113==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10113==    by 0x42D8E9: execcmd (exec.c:3378)
==10113==    by 0x428CA0: execpline2 (exec.c:1697)
==10113==    by 0x427FD2: execpline (exec.c:1484)
==10113==    by 0x42779A: execlist (exec.c:1275)
==10113==    by 0x42717C: execode (exec.c:1073)
==10113==    by 0x431299: runshfunc (exec.c:5040)
==10113==    by 0x430E76: doshfunc (exec.c:4920)
==10113==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10113== 
==10113== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10112-- Caught __NR_exit; running __libc_freeres()
--10112-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10112== 
==10112== HEAP SUMMARY:
==10112==     in use at exit: 3,164,557 bytes in 69,245 blocks
==10112==   total heap usage: 1,597,599 allocs, 1,528,354 frees, 129,071,206 bytes allocated
==10112== 
==10112== Searching for pointers to 69,245 not-freed blocks
--10112--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10112--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10112--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10112--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10112--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10112--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10112--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10112--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10112--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10112--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10112--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10112--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10112--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10112--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10112--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10112--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10112--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10112--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10112--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10112--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10112--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10112--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10112--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10112--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10112--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10112--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10112--   Scanning root segment: 0x701a000..0x701afff (4096)
--10112--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10112--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10112--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10112--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10112--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10112--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10112--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10112--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10112--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10112--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10112== Checked 4,922,520 bytes
==10112== 
==10112== LEAK SUMMARY:
==10112==    definitely lost: 2,197 bytes in 13 blocks
==10112==    indirectly lost: 6,756 bytes in 7 blocks
==10112==      possibly lost: 0 bytes in 0 blocks
==10112==    still reachable: 3,155,604 bytes in 69,225 blocks
==10112==         suppressed: 0 bytes in 0 blocks
==10112== Rerun with --leak-check=full to see details of leaked memory
==10112== 
==10112== Use --track-origins=yes to see where uninitialised values come from
==10112== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10112== 
==10112== 1 errors in context 1 of 2:
==10112== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10112==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10112==    by 0x488CD0: stringsubst (subst.c:301)
==10112==    by 0x48801B: prefork (subst.c:77)
==10112==    by 0x42B318: execcmd (exec.c:2619)
==10112==    by 0x428CA0: execpline2 (exec.c:1697)
==10112==    by 0x427FD2: execpline (exec.c:1484)
==10112==    by 0x427756: execlist (exec.c:1267)
==10112==    by 0x42717C: execode (exec.c:1073)
==10112==    by 0x431299: runshfunc (exec.c:5040)
==10112==    by 0x430E76: doshfunc (exec.c:4920)
==10112==    by 0x4302FB: execshfunc (exec.c:4557)
==10112==    by 0x42D8C1: execcmd (exec.c:3373)
==10112== 
==10112== 
==10112== 2 errors in context 2 of 2:
==10112== Conditional jump or move depends on uninitialised value(s)
==10112==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10112==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10112==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10112==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10112==    by 0x42D8E9: execcmd (exec.c:3378)
==10112==    by 0x428CA0: execpline2 (exec.c:1697)
==10112==    by 0x427FD2: execpline (exec.c:1484)
==10112==    by 0x42779A: execlist (exec.c:1275)
==10112==    by 0x42717C: execode (exec.c:1073)
==10112==    by 0x431299: runshfunc (exec.c:5040)
==10112==    by 0x430E76: doshfunc (exec.c:4920)
==10112==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10112== 
==10112== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10115== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10115-by-pythonnut-on-???
==10115== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10115-by-pythonnut-on-???
==10115== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10115-by-pythonnut-on-???
==10115== 
==10115== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10115== don't want to do, unless you know exactly what you're doing,
==10115== or are doing some strange experiment):
==10115==   /usr/lib/valgrind/../../bin/vgdb --pid=10115 ...command...
==10115== 
==10115== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10115==   /path/to/gdb ./zsh
==10115== and then give GDB the following command
==10115==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10115
==10115== --pid is optional if only one valgrind process is running
==10115== 
==10116== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10116-by-pythonnut-on-???
==10116== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10116-by-pythonnut-on-???
==10116== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10116-by-pythonnut-on-???
==10116== 
==10116== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10116== don't want to do, unless you know exactly what you're doing,
==10116== or are doing some strange experiment):
==10116==   /usr/lib/valgrind/../../bin/vgdb --pid=10116 ...command...
==10116== 
==10116== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10116==   /path/to/gdb ./zsh
==10116== and then give GDB the following command
==10116==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10116
==10116== --pid is optional if only one valgrind process is running
==10116== 
--10116-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE9FCC,  len 4
--10116-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10116== 
==10116== HEAP SUMMARY:
==10116==     in use at exit: 3,201,301 bytes in 69,251 blocks
==10116==   total heap usage: 1,597,606 allocs, 1,528,355 frees, 129,109,679 bytes allocated
==10116== 
==10116== Searching for pointers to 69,251 not-freed blocks
--10116--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10116--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10116--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10116--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10116--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10116--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10116--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10116--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10116--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10116--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10116--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10116--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10116--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10116--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10116--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10116--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10116--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10116--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10116--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10116--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10116--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10116--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10116--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10116--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10116--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10116--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10116--   Scanning root segment: 0x701a000..0x701afff (4096)
--10116--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10116--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10116--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10116--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10116--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10116--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10116--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10116--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10116--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10116--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10116== Checked 4,996,480 bytes
==10116== 
==10116== LEAK SUMMARY:
==10116==    definitely lost: 2,197 bytes in 13 blocks
==10116==    indirectly lost: 6,756 bytes in 7 blocks
==10116==      possibly lost: 0 bytes in 0 blocks
==10116==    still reachable: 3,192,348 bytes in 69,231 blocks
==10116==         suppressed: 0 bytes in 0 blocks
==10116== Rerun with --leak-check=full to see details of leaked memory
==10116== 
==10116== Use --track-origins=yes to see where uninitialised values come from
==10116== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10116== 
==10116== 1 errors in context 1 of 2:
==10116== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10116==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10116==    by 0x488CD0: stringsubst (subst.c:301)
==10116==    by 0x48801B: prefork (subst.c:77)
==10116==    by 0x42B318: execcmd (exec.c:2619)
==10116==    by 0x428CA0: execpline2 (exec.c:1697)
==10116==    by 0x427FD2: execpline (exec.c:1484)
==10116==    by 0x427756: execlist (exec.c:1267)
==10116==    by 0x42717C: execode (exec.c:1073)
==10116==    by 0x431299: runshfunc (exec.c:5040)
==10116==    by 0x430E76: doshfunc (exec.c:4920)
==10116==    by 0x4302FB: execshfunc (exec.c:4557)
==10116==    by 0x42D8C1: execcmd (exec.c:3373)
==10116== 
==10116== 
==10116== 2 errors in context 2 of 2:
==10116== Conditional jump or move depends on uninitialised value(s)
==10116==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10116==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10116==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10116==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10116==    by 0x42D8E9: execcmd (exec.c:3378)
==10116==    by 0x428CA0: execpline2 (exec.c:1697)
==10116==    by 0x427FD2: execpline (exec.c:1484)
==10116==    by 0x42779A: execlist (exec.c:1275)
==10116==    by 0x42717C: execode (exec.c:1073)
==10116==    by 0x431299: runshfunc (exec.c:5040)
==10116==    by 0x430E76: doshfunc (exec.c:4920)
==10116==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10116== 
==10116== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10115-- Caught __NR_exit; running __libc_freeres()
--10115-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10115== 
==10115== HEAP SUMMARY:
==10115==     in use at exit: 3,164,757 bytes in 69,248 blocks
==10115==   total heap usage: 1,597,609 allocs, 1,528,361 frees, 129,110,351 bytes allocated
==10115== 
==10115== Searching for pointers to 69,248 not-freed blocks
--10115--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10115--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10115--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10115--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10115--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10115--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10115--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10115--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10115--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10115--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10115--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10115--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10115--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10115--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10115--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10115--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10115--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10115--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10115--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10115--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10115--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10115--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10115--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10115--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10115--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10115--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10115--   Scanning root segment: 0x701a000..0x701afff (4096)
--10115--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10115--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10115--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10115--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10115--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10115--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10115--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10115--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10115--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10115--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10115== Checked 4,959,304 bytes
==10115== 
==10115== LEAK SUMMARY:
==10115==    definitely lost: 2,197 bytes in 13 blocks
==10115==    indirectly lost: 6,756 bytes in 7 blocks
==10115==      possibly lost: 0 bytes in 0 blocks
==10115==    still reachable: 3,155,804 bytes in 69,228 blocks
==10115==         suppressed: 0 bytes in 0 blocks
==10115== Rerun with --leak-check=full to see details of leaked memory
==10115== 
==10115== Use --track-origins=yes to see where uninitialised values come from
==10115== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10115== 
==10115== 1 errors in context 1 of 2:
==10115== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10115==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10115==    by 0x488CD0: stringsubst (subst.c:301)
==10115==    by 0x48801B: prefork (subst.c:77)
==10115==    by 0x42B318: execcmd (exec.c:2619)
==10115==    by 0x428CA0: execpline2 (exec.c:1697)
==10115==    by 0x427FD2: execpline (exec.c:1484)
==10115==    by 0x427756: execlist (exec.c:1267)
==10115==    by 0x42717C: execode (exec.c:1073)
==10115==    by 0x431299: runshfunc (exec.c:5040)
==10115==    by 0x430E76: doshfunc (exec.c:4920)
==10115==    by 0x4302FB: execshfunc (exec.c:4557)
==10115==    by 0x42D8C1: execcmd (exec.c:3373)
==10115== 
==10115== 
==10115== 2 errors in context 2 of 2:
==10115== Conditional jump or move depends on uninitialised value(s)
==10115==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10115==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10115==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10115==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10115==    by 0x42D8E9: execcmd (exec.c:3378)
==10115==    by 0x428CA0: execpline2 (exec.c:1697)
==10115==    by 0x427FD2: execpline (exec.c:1484)
==10115==    by 0x42779A: execlist (exec.c:1275)
==10115==    by 0x42717C: execode (exec.c:1073)
==10115==    by 0x431299: runshfunc (exec.c:5040)
==10115==    by 0x430E76: doshfunc (exec.c:4920)
==10115==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10115== 
==10115== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10096-- Caught __NR_exit; running __libc_freeres()
--10096-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10096== 
==10096== HEAP SUMMARY:
==10096==     in use at exit: 3,127,063 bytes in 69,225 blocks
==10096==   total heap usage: 1,597,615 allocs, 1,528,390 frees, 129,078,241 bytes allocated
==10096== 
==10096== Searching for pointers to 69,225 not-freed blocks
--10096--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10096--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10096--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10096--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10096--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10096--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10096--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10096--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10096--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10096--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10096--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10096--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10096--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10096--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10096--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10096--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10096--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10096--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10096--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10096--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10096--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10096--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10096--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10096--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10096--   Scanning root segment: 0x701a000..0x701afff (4096)
--10096--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10096--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10096--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10096--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10096--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10096--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10096--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10096--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10096--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10096--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10096== Checked 4,791,208 bytes
==10096== 
==10096== LEAK SUMMARY:
==10096==    definitely lost: 2,197 bytes in 13 blocks
==10096==    indirectly lost: 6,756 bytes in 7 blocks
==10096==      possibly lost: 0 bytes in 0 blocks
==10096==    still reachable: 3,118,110 bytes in 69,205 blocks
==10096==         suppressed: 0 bytes in 0 blocks
==10096== Rerun with --leak-check=full to see details of leaked memory
==10096== 
==10096== Use --track-origins=yes to see where uninitialised values come from
==10096== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10096== 
==10096== 1 errors in context 1 of 2:
==10096== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10096==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10096==    by 0x488CD0: stringsubst (subst.c:301)
==10096==    by 0x48801B: prefork (subst.c:77)
==10096==    by 0x42B318: execcmd (exec.c:2619)
==10096==    by 0x428CA0: execpline2 (exec.c:1697)
==10096==    by 0x427FD2: execpline (exec.c:1484)
==10096==    by 0x427756: execlist (exec.c:1267)
==10096==    by 0x42717C: execode (exec.c:1073)
==10096==    by 0x431299: runshfunc (exec.c:5040)
==10096==    by 0x430E76: doshfunc (exec.c:4920)
==10096==    by 0x4302FB: execshfunc (exec.c:4557)
==10096==    by 0x42D8C1: execcmd (exec.c:3373)
==10096== 
==10096== 
==10096== 2 errors in context 2 of 2:
==10096== Conditional jump or move depends on uninitialised value(s)
==10096==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10096==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10096==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10096==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10096==    by 0x42D8E9: execcmd (exec.c:3378)
==10096==    by 0x428CA0: execpline2 (exec.c:1697)
==10096==    by 0x427FD2: execpline (exec.c:1484)
==10096==    by 0x42779A: execlist (exec.c:1275)
==10096==    by 0x42717C: execode (exec.c:1073)
==10096==    by 0x431299: runshfunc (exec.c:5040)
==10096==    by 0x430E76: doshfunc (exec.c:4920)
==10096==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10096== 
==10096== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10095-- Caught __NR_exit; running __libc_freeres()
--10095-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10095== 
==10095== HEAP SUMMARY:
==10095==     in use at exit: 3,125,647 bytes in 69,187 blocks
==10095==   total heap usage: 1,597,514 allocs, 1,528,327 frees, 129,006,363 bytes allocated
==10095== 
==10095== Searching for pointers to 69,187 not-freed blocks
--10095--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10095--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10095--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10095--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10095--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10095--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10095--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10095--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10095--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10095--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10095--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10095--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10095--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10095--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10095--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10095--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10095--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10095--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10095--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10095--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10095--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10095--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10095--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10095--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10095--   Scanning root segment: 0x701a000..0x701afff (4096)
--10095--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10095--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10095--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10095--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10095--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10095--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10095--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10095--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10095--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10095--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10095== Checked 4,788,048 bytes
==10095== 
==10095== LEAK SUMMARY:
==10095==    definitely lost: 2,197 bytes in 13 blocks
==10095==    indirectly lost: 6,756 bytes in 7 blocks
==10095==      possibly lost: 0 bytes in 0 blocks
==10095==    still reachable: 3,116,694 bytes in 69,167 blocks
==10095==         suppressed: 0 bytes in 0 blocks
==10095== Rerun with --leak-check=full to see details of leaked memory
==10095== 
==10095== Use --track-origins=yes to see where uninitialised values come from
==10095== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10095== 
==10095== 1 errors in context 1 of 2:
==10095== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10095==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10095==    by 0x488CD0: stringsubst (subst.c:301)
==10095==    by 0x48801B: prefork (subst.c:77)
==10095==    by 0x42B318: execcmd (exec.c:2619)
==10095==    by 0x428CA0: execpline2 (exec.c:1697)
==10095==    by 0x427FD2: execpline (exec.c:1484)
==10095==    by 0x427756: execlist (exec.c:1267)
==10095==    by 0x42717C: execode (exec.c:1073)
==10095==    by 0x431299: runshfunc (exec.c:5040)
==10095==    by 0x430E76: doshfunc (exec.c:4920)
==10095==    by 0x4302FB: execshfunc (exec.c:4557)
==10095==    by 0x42D8C1: execcmd (exec.c:3373)
==10095== 
==10095== 
==10095== 2 errors in context 2 of 2:
==10095== Conditional jump or move depends on uninitialised value(s)
==10095==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10095==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10095==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10095==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10095==    by 0x42D8E9: execcmd (exec.c:3378)
==10095==    by 0x428CA0: execpline2 (exec.c:1697)
==10095==    by 0x427FD2: execpline (exec.c:1484)
==10095==    by 0x42779A: execlist (exec.c:1275)
==10095==    by 0x42717C: execode (exec.c:1073)
==10095==    by 0x431299: runshfunc (exec.c:5040)
==10095==    by 0x430E76: doshfunc (exec.c:4920)
==10095==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10095== 
==10095== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10120-by-pythonnut-on-???
==10120== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10120-by-pythonnut-on-???
==10120== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10120-by-pythonnut-on-???
==10120== 
==10120== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10120== don't want to do, unless you know exactly what you're doing,
==10120== or are doing some strange experiment):
==10120==   /usr/lib/valgrind/../../bin/vgdb --pid=10120 ...command...
==10120== 
==10120== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10120==   /path/to/gdb ./zsh
==10120== and then give GDB the following command
==10120==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10120
==10120== --pid is optional if only one valgrind process is running
==10120== 
==10121== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10121-by-pythonnut-on-???
==10121== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10121-by-pythonnut-on-???
==10121== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10121-by-pythonnut-on-???
==10121== 
==10121== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10121== don't want to do, unless you know exactly what you're doing,
==10121== or are doing some strange experiment):
==10121==   /usr/lib/valgrind/../../bin/vgdb --pid=10121 ...command...
==10121== 
==10121== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10121==   /path/to/gdb ./zsh
==10121== and then give GDB the following command
==10121==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10121
==10121== --pid is optional if only one valgrind process is running
==10121== 
==10123== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10123-by-pythonnut-on-???
==10123== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10123-by-pythonnut-on-???
==10123== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10123-by-pythonnut-on-???
==10123== 
==10123== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10123== don't want to do, unless you know exactly what you're doing,
==10123== or are doing some strange experiment):
==10123==   /usr/lib/valgrind/../../bin/vgdb --pid=10123 ...command...
==10123== 
==10123== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10123==   /path/to/gdb ./zsh
==10123== and then give GDB the following command
==10123==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10123
==10123== --pid is optional if only one valgrind process is running
==10123== 
--10122-- Caught __NR_exit; running __libc_freeres()
==10122== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10122-by-pythonnut-on-???
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==10122== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10122-by-pythonnut-on-???
==10122== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10122-by-pythonnut-on-???
==10122== 
==10122== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10122== don't want to do, unless you know exactly what you're doing,
==10122== or are doing some strange experiment):
==10122==   /usr/lib/valgrind/../../bin/vgdb --pid=10122 ...command...
==10122== 
==10122== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10122==   /path/to/gdb ./zsh
==10122== and then give GDB the following command
==10122==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10122
==10122== --pid is optional if only one valgrind process is running
==10122== 
==10125== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10125-by-pythonnut-on-???
==10125== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10125-by-pythonnut-on-???
==10125== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10125-by-pythonnut-on-???
==10125== 
==10125== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10125== don't want to do, unless you know exactly what you're doing,
==10125== or are doing some strange experiment):
==10125==   /usr/lib/valgrind/../../bin/vgdb --pid=10125 ...command...
==10125== 
==10125== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10125==   /path/to/gdb ./zsh
==10125== and then give GDB the following command
==10125==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10125
==10125== --pid is optional if only one valgrind process is running
==10125== 
--10122-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10126== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10126-by-pythonnut-on-???
==10126== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10126-by-pythonnut-on-???
==10126== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10126-by-pythonnut-on-???
==10126== 
==10126== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10126== don't want to do, unless you know exactly what you're doing,
==10126== or are doing some strange experiment):
==10126==   /usr/lib/valgrind/../../bin/vgdb --pid=10126 ...command...
==10126== 
==10126== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10126==   /path/to/gdb ./zsh
==10126== and then give GDB the following command
==10126==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10126
==10126== --pid is optional if only one valgrind process is running
==10126== 
==10122== 
==10122== HEAP SUMMARY:
==10122==     in use at exit: 3,111,995 bytes in 68,923 blocks
==10122==   total heap usage: 1,597,746 allocs, 1,528,823 frees, 129,009,694 bytes allocated
==10122== 
client request: code 4d430005,  addr 0xFFEFE66FC,  len 4
--10126-- Caught __NR_exit; running __libc_freeres()
==10122== Searching for pointers to 68,923 not-freed blocks
--10122--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10122--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10122--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10122--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10122--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10122--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10122--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10122--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10122--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10122--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10122--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10122--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10122--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10122--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10122--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10122--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10122--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10122--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10122--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10122--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10122--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10122--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10122--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10122--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10122--   Scanning root segment: 0x701a000..0x701afff (4096)
--10122--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10122--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10122--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10122--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10122--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10122--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10122--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10122--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10122--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10122--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10126-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10126== 
==10126== HEAP SUMMARY:
==10126==     in use at exit: 3,137,562 bytes in 69,547 blocks
==10126==   total heap usage: 1,595,146 allocs, 1,525,599 frees, 128,918,844 bytes allocated
==10126== 
==10126== Searching for pointers to 69,547 not-freed blocks
--10126--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10126--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10126--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10126--   Scanning root segment: 0x4037000..0x403efff (32768)
--10126--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10126--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10126--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10126--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10126--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10126--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10126--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10126--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10126--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10126--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10126--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10126--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10126--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10126--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10126--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10126--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10126--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10126--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10126--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10126--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10126--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10126--   Scanning root segment: 0x701a000..0x701afff (4096)
--10126--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10126--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10126--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10126--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10126--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10126--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10126--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10126--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10126--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10126--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10122== Checked 4,768,120 bytes
==10122== 
==10122== LEAK SUMMARY:
==10122==    definitely lost: 2,197 bytes in 13 blocks
==10122==    indirectly lost: 6,756 bytes in 7 blocks
==10122==      possibly lost: 0 bytes in 0 blocks
==10122==    still reachable: 3,103,042 bytes in 68,903 blocks
==10122==         suppressed: 0 bytes in 0 blocks
==10122== Rerun with --leak-check=full to see details of leaked memory
==10122== 
==10122== Use --track-origins=yes to see where uninitialised values come from
==10122== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10122== 
==10122== 1 errors in context 1 of 2:
==10122== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10122==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10122==    by 0x488CD0: stringsubst (subst.c:301)
==10122==    by 0x48801B: prefork (subst.c:77)
==10122==    by 0x42B318: execcmd (exec.c:2619)
==10122==    by 0x428CA0: execpline2 (exec.c:1697)
==10122==    by 0x427FD2: execpline (exec.c:1484)
==10122==    by 0x427756: execlist (exec.c:1267)
==10122==    by 0x42717C: execode (exec.c:1073)
==10122==    by 0x431299: runshfunc (exec.c:5040)
==10122==    by 0x430E76: doshfunc (exec.c:4920)
==10122==    by 0x4302FB: execshfunc (exec.c:4557)
==10122==    by 0x42D8C1: execcmd (exec.c:3373)
==10122== 
==10122== 
==10122== 2 errors in context 2 of 2:
==10122== Conditional jump or move depends on uninitialised value(s)
==10122==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10122==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10122==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10122==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10122==    by 0x42D8E9: execcmd (exec.c:3378)
==10122==    by 0x428CA0: execpline2 (exec.c:1697)
==10122==    by 0x427FD2: execpline (exec.c:1484)
==10122==    by 0x42779A: execlist (exec.c:1275)
==10122==    by 0x42717C: execode (exec.c:1073)
==10122==    by 0x431299: runshfunc (exec.c:5040)
==10122==    by 0x430E76: doshfunc (exec.c:4920)
==10122==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10122== 
==10122== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10120-- Caught __NR_exit; running __libc_freeres()
==10126== Checked 4,841,488 bytes
==10126== 
--10120-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10120== 
==10120== HEAP SUMMARY:
==10120==     in use at exit: 3,111,628 bytes in 68,913 blocks
==10120==   total heap usage: 1,597,749 allocs, 1,528,836 frees, 129,010,334 bytes allocated
==10120== 
==10126== LEAK SUMMARY:
==10126==    definitely lost: 2,221 bytes in 14 blocks
==10126==    indirectly lost: 6,796 bytes in 9 blocks
==10126==      possibly lost: 0 bytes in 0 blocks
==10126==    still reachable: 3,128,545 bytes in 69,524 blocks
==10126==         suppressed: 0 bytes in 0 blocks
==10126== Rerun with --leak-check=full to see details of leaked memory
==10126== 
==10126== Use --track-origins=yes to see where uninitialised values come from
==10126== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10126== 
==10126== 1 errors in context 1 of 2:
==10126== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10126==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10126==    by 0x488CD0: stringsubst (subst.c:301)
==10126==    by 0x48801B: prefork (subst.c:77)
==10126==    by 0x42B318: execcmd (exec.c:2619)
==10126==    by 0x428CA0: execpline2 (exec.c:1697)
==10126==    by 0x427FD2: execpline (exec.c:1484)
==10126==    by 0x427756: execlist (exec.c:1267)
==10126==    by 0x42717C: execode (exec.c:1073)
==10126==    by 0x431299: runshfunc (exec.c:5040)
==10126==    by 0x430E76: doshfunc (exec.c:4920)
==10126==    by 0x4302FB: execshfunc (exec.c:4557)
==10126==    by 0x42D8C1: execcmd (exec.c:3373)
==10126== 
==10126== 
==10126== 2 errors in context 2 of 2:
==10126== Conditional jump or move depends on uninitialised value(s)
==10126==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10126==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10126==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10126==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10126==    by 0x42D8E9: execcmd (exec.c:3378)
==10126==    by 0x428CA0: execpline2 (exec.c:1697)
==10126==    by 0x427FD2: execpline (exec.c:1484)
==10126==    by 0x42779A: execlist (exec.c:1275)
==10126==    by 0x42717C: execode (exec.c:1073)
==10126==    by 0x431299: runshfunc (exec.c:5040)
==10126==    by 0x430E76: doshfunc (exec.c:4920)
==10126==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10126== 
==10126== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== Searching for pointers to 68,913 not-freed blocks
--10120--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10120--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10120--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10120--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10120--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10120--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10120--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10120--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10120--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10120--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10120--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10120--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10120--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10120--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10120--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10120--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10120--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10120--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10120--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10120--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10120--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10120--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10120--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10120--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10120--   Scanning root segment: 0x701a000..0x701afff (4096)
--10120--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10120--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10120--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10120--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10120--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10120--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10120--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10120--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10120--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10120--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFE6BAC,  len 4
==10120== Checked 4,765,792 bytes
==10120== 
==10120== LEAK SUMMARY:
==10120==    definitely lost: 2,197 bytes in 13 blocks
==10120==    indirectly lost: 6,756 bytes in 7 blocks
==10120==      possibly lost: 0 bytes in 0 blocks
==10120==    still reachable: 3,102,675 bytes in 68,893 blocks
==10120==         suppressed: 0 bytes in 0 blocks
==10120== Rerun with --leak-check=full to see details of leaked memory
==10120== 
==10120== Use --track-origins=yes to see where uninitialised values come from
==10120== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== 
==10120== 1 errors in context 1 of 2:
==10120== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10120==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10120==    by 0x488CD0: stringsubst (subst.c:301)
==10120==    by 0x48801B: prefork (subst.c:77)
==10120==    by 0x42B318: execcmd (exec.c:2619)
==10120==    by 0x428CA0: execpline2 (exec.c:1697)
==10120==    by 0x427FD2: execpline (exec.c:1484)
==10120==    by 0x427756: execlist (exec.c:1267)
==10120==    by 0x42717C: execode (exec.c:1073)
==10120==    by 0x431299: runshfunc (exec.c:5040)
==10120==    by 0x430E76: doshfunc (exec.c:4920)
==10120==    by 0x4302FB: execshfunc (exec.c:4557)
==10120==    by 0x42D8C1: execcmd (exec.c:3373)
==10120== 
==10120== 
==10120== 2 errors in context 2 of 2:
==10120== Conditional jump or move depends on uninitialised value(s)
==10120==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10120==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10120==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10120==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10120==    by 0x42D8E9: execcmd (exec.c:3378)
==10120==    by 0x428CA0: execpline2 (exec.c:1697)
==10120==    by 0x427FD2: execpline (exec.c:1484)
==10120==    by 0x42779A: execlist (exec.c:1275)
==10120==    by 0x42717C: execode (exec.c:1073)
==10120==    by 0x431299: runshfunc (exec.c:5040)
==10120==    by 0x430E76: doshfunc (exec.c:4920)
==10120==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10120== 
==10120== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10128-- Caught __NR_exit; running __libc_freeres()
--10177-- Caught __NR_exit; running __libc_freeres()
==10128== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10128-by-pythonnut-on-???
==10128== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10128-by-pythonnut-on-???
==10128== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10128-by-pythonnut-on-???
==10128== 
==10128== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10128== don't want to do, unless you know exactly what you're doing,
==10128== or are doing some strange experiment):
==10128==   /usr/lib/valgrind/../../bin/vgdb --pid=10128 ...command...
==10128== 
==10128== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10128==   /path/to/gdb ./zsh
==10128== and then give GDB the following command
==10128==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10128
==10128== --pid is optional if only one valgrind process is running
==10128== 
==10177== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10177-by-pythonnut-on-???
==10177== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10177-by-pythonnut-on-???
==10177== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10177-by-pythonnut-on-???
==10177== 
==10177== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10177== don't want to do, unless you know exactly what you're doing,
==10177== or are doing some strange experiment):
==10177==   /usr/lib/valgrind/../../bin/vgdb --pid=10177 ...command...
==10177== 
==10177== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10177==   /path/to/gdb ./zsh
==10177== and then give GDB the following command
==10177==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10177
==10177== --pid is optional if only one valgrind process is running
==10177== 
--10128-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
==10128== 
==10128== HEAP SUMMARY:
==10128==     in use at exit: 3,137,839 bytes in 69,552 blocks
==10128==   total heap usage: 1,595,159 allocs, 1,525,607 frees, 128,922,841 bytes allocated
==10128== 
--10177-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
==10177== 
==10177== HEAP SUMMARY:
==10177==     in use at exit: 3,112,084 bytes in 68,925 blocks
==10177==   total heap usage: 1,597,788 allocs, 1,528,863 frees, 129,025,954 bytes allocated
==10177== 
==10128== Searching for pointers to 69,552 not-freed blocks
--10128--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10128--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10128--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10128--   Scanning root segment: 0x4037000..0x403efff (32768)
--10128--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10128--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10128--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10128--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10128--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10128--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10128--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10128--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10128--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10128--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10128--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10128--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10128--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10128--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10128--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10128--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10128--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10128--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10128--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10128--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10128--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10128--   Scanning root segment: 0x701a000..0x701afff (4096)
--10128--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10128--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10128--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10128--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10128--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10128--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10128--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10128--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10128--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10128--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10177== Searching for pointers to 68,925 not-freed blocks
--10177--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10177--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10177--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10177--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10177--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10177--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10177--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10177--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10177--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10177--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10177--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10177--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10177--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10177--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10177--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10177--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10177--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10177--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10177--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10177--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10177--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10177--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10177--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10177--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10177--   Scanning root segment: 0x701a000..0x701afff (4096)
--10177--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10177--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10177--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10177--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10177--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10177--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10177--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10177--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10177--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10177--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10128== Checked 4,841,472 bytes
==10128== 
==10177== Checked 4,770,168 bytes
==10177== 
==10177== LEAK SUMMARY:
==10177==    definitely lost: 2,197 bytes in 13 blocks
==10177==    indirectly lost: 6,756 bytes in 7 blocks
==10177==      possibly lost: 0 bytes in 0 blocks
==10177==    still reachable: 3,103,131 bytes in 68,905 blocks
==10177==         suppressed: 0 bytes in 0 blocks
==10177== Rerun with --leak-check=full to see details of leaked memory
==10177== 
==10177== Use --track-origins=yes to see where uninitialised values come from
==10177== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10177== 
==10177== 1 errors in context 1 of 2:
==10177== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10177==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10177==    by 0x488CD0: stringsubst (subst.c:301)
==10177==    by 0x48801B: prefork (subst.c:77)
==10177==    by 0x42B318: execcmd (exec.c:2619)
==10177==    by 0x428CA0: execpline2 (exec.c:1697)
==10177==    by 0x427FD2: execpline (exec.c:1484)
==10177==    by 0x427756: execlist (exec.c:1267)
==10177==    by 0x42717C: execode (exec.c:1073)
==10177==    by 0x431299: runshfunc (exec.c:5040)
==10177==    by 0x430E76: doshfunc (exec.c:4920)
==10177==    by 0x4302FB: execshfunc (exec.c:4557)
==10177==    by 0x42D8C1: execcmd (exec.c:3373)
==10177== 
==10177== 
==10177== 2 errors in context 2 of 2:
==10177== Conditional jump or move depends on uninitialised value(s)
==10177==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10177==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10177==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10177==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10177==    by 0x42D8E9: execcmd (exec.c:3378)
==10177==    by 0x428CA0: execpline2 (exec.c:1697)
==10177==    by 0x427FD2: execpline (exec.c:1484)
==10177==    by 0x42779A: execlist (exec.c:1275)
==10177==    by 0x42717C: execode (exec.c:1073)
==10177==    by 0x431299: runshfunc (exec.c:5040)
==10177==    by 0x430E76: doshfunc (exec.c:4920)
==10177==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10177== 
==10177== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10128== LEAK SUMMARY:
==10128==    definitely lost: 2,221 bytes in 14 blocks
==10128==    indirectly lost: 6,796 bytes in 9 blocks
==10128==      possibly lost: 0 bytes in 0 blocks
==10128==    still reachable: 3,128,822 bytes in 69,529 blocks
==10128==         suppressed: 0 bytes in 0 blocks
==10128== Rerun with --leak-check=full to see details of leaked memory
==10128== 
==10128== Use --track-origins=yes to see where uninitialised values come from
==10128== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10128== 
==10128== 1 errors in context 1 of 2:
==10128== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10128==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10128==    by 0x488CD0: stringsubst (subst.c:301)
==10128==    by 0x48801B: prefork (subst.c:77)
==10128==    by 0x42B318: execcmd (exec.c:2619)
==10128==    by 0x428CA0: execpline2 (exec.c:1697)
==10128==    by 0x427FD2: execpline (exec.c:1484)
==10128==    by 0x427756: execlist (exec.c:1267)
==10128==    by 0x42717C: execode (exec.c:1073)
==10128==    by 0x431299: runshfunc (exec.c:5040)
==10128==    by 0x430E76: doshfunc (exec.c:4920)
==10128==    by 0x4302FB: execshfunc (exec.c:4557)
==10128==    by 0x42D8C1: execcmd (exec.c:3373)
==10128== 
==10128== 
==10128== 2 errors in context 2 of 2:
==10128== Conditional jump or move depends on uninitialised value(s)
==10128==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10128==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10128==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10128==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10128==    by 0x42D8E9: execcmd (exec.c:3378)
==10128==    by 0x428CA0: execpline2 (exec.c:1697)
==10128==    by 0x427FD2: execpline (exec.c:1484)
==10128==    by 0x42779A: execlist (exec.c:1275)
==10128==    by 0x42717C: execode (exec.c:1073)
==10128==    by 0x431299: runshfunc (exec.c:5040)
==10128==    by 0x430E76: doshfunc (exec.c:4920)
==10128==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10128== 
==10128== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10175-- Caught __NR_exit; running __libc_freeres()
--10125-- Caught __NR_exit; running __libc_freeres()
==10175== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10175-by-pythonnut-on-???
==10175== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10175-by-pythonnut-on-???
==10175== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10175-by-pythonnut-on-???
==10175== 
==10175== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10175== don't want to do, unless you know exactly what you're doing,
==10175== or are doing some strange experiment):
==10175==   /usr/lib/valgrind/../../bin/vgdb --pid=10175 ...command...
==10175== 
==10175== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10175==   /path/to/gdb ./zsh
==10175== and then give GDB the following command
==10175==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10175
==10175== --pid is optional if only one valgrind process is running
==10175== 
--10125-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10175-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10125== 
==10125== HEAP SUMMARY:
==10125==     in use at exit: 3,135,675 bytes in 69,477 blocks
==10125==   total heap usage: 1,595,110 allocs, 1,525,633 frees, 128,923,452 bytes allocated
==10125== 
==10175== 
==10175== HEAP SUMMARY:
==10175==     in use at exit: 3,112,065 bytes in 68,926 blocks
==10175==   total heap usage: 1,597,785 allocs, 1,528,859 frees, 129,022,394 bytes allocated
==10175== 
==10125== Searching for pointers to 69,477 not-freed blocks
--10125--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10125--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10125--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10125--   Scanning root segment: 0x4037000..0x403afff (16384)
--10125--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10125--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10125--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10125--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10125--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10125--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10125--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10125--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10125--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10125--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10125--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10125--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10125--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10125--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10125--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10125--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10125--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10125--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10125--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10125--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10125--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10125--   Scanning root segment: 0x701a000..0x701afff (4096)
--10125--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10125--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10125--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10125--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10125--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10125--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10125--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10125--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10125--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10125--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10175== Searching for pointers to 68,926 not-freed blocks
--10175--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10175--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10175--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10175--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10175--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10175--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10175--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10175--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10175--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10175--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10175--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10175--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10175--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10175--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10175--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10175--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10175--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10175--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10175--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10175--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10175--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10175--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10175--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10175--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10175--   Scanning root segment: 0x701a000..0x701afff (4096)
--10175--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10175--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10175--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10175--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10175--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10175--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10175--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10175--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10175--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10175--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10125== Checked 4,821,400 bytes
==10125== 
==10175== Checked 4,769,840 bytes
==10175== 
==10125== LEAK SUMMARY:
==10125==    definitely lost: 2,221 bytes in 14 blocks
==10125==    indirectly lost: 6,796 bytes in 9 blocks
==10125==      possibly lost: 0 bytes in 0 blocks
==10125==    still reachable: 3,126,658 bytes in 69,454 blocks
==10125==         suppressed: 0 bytes in 0 blocks
==10125== Rerun with --leak-check=full to see details of leaked memory
==10125== 
==10125== Use --track-origins=yes to see where uninitialised values come from
==10125== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10125== 
==10125== 1 errors in context 1 of 2:
==10125== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10125==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10125==    by 0x488CD0: stringsubst (subst.c:301)
==10125==    by 0x48801B: prefork (subst.c:77)
==10125==    by 0x42B318: execcmd (exec.c:2619)
==10125==    by 0x428CA0: execpline2 (exec.c:1697)
==10125==    by 0x427FD2: execpline (exec.c:1484)
==10125==    by 0x427756: execlist (exec.c:1267)
==10125==    by 0x42717C: execode (exec.c:1073)
==10125==    by 0x431299: runshfunc (exec.c:5040)
==10125==    by 0x430E76: doshfunc (exec.c:4920)
==10125==    by 0x4302FB: execshfunc (exec.c:4557)
==10125==    by 0x42D8C1: execcmd (exec.c:3373)
==10125== 
==10125== 
==10125== 2 errors in context 2 of 2:
==10125== Conditional jump or move depends on uninitialised value(s)
==10125==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10125==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10125==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10125==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10125==    by 0x42D8E9: execcmd (exec.c:3378)
==10125==    by 0x428CA0: execpline2 (exec.c:1697)
==10125==    by 0x427FD2: execpline (exec.c:1484)
==10125==    by 0x42779A: execlist (exec.c:1275)
==10125==    by 0x42717C: execode (exec.c:1073)
==10125==    by 0x431299: runshfunc (exec.c:5040)
==10125==    by 0x430E76: doshfunc (exec.c:4920)
==10125==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10125== 
==10125== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10175== LEAK SUMMARY:
==10175==    definitely lost: 2,197 bytes in 13 blocks
==10175==    indirectly lost: 6,756 bytes in 7 blocks
==10175==      possibly lost: 0 bytes in 0 blocks
==10175==    still reachable: 3,103,112 bytes in 68,906 blocks
==10175==         suppressed: 0 bytes in 0 blocks
==10175== Rerun with --leak-check=full to see details of leaked memory
==10175== 
==10175== Use --track-origins=yes to see where uninitialised values come from
==10175== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10175== 
==10175== 1 errors in context 1 of 2:
==10175== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10175==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10175==    by 0x488CD0: stringsubst (subst.c:301)
==10175==    by 0x48801B: prefork (subst.c:77)
==10175==    by 0x42B318: execcmd (exec.c:2619)
==10175==    by 0x428CA0: execpline2 (exec.c:1697)
==10175==    by 0x427FD2: execpline (exec.c:1484)
==10175==    by 0x427756: execlist (exec.c:1267)
==10175==    by 0x42717C: execode (exec.c:1073)
==10175==    by 0x431299: runshfunc (exec.c:5040)
==10175==    by 0x430E76: doshfunc (exec.c:4920)
==10175==    by 0x4302FB: execshfunc (exec.c:4557)
==10175==    by 0x42D8C1: execcmd (exec.c:3373)
==10175== 
==10175== 
==10175== 2 errors in context 2 of 2:
==10175== Conditional jump or move depends on uninitialised value(s)
==10175==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10175==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10175==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10175==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10175==    by 0x42D8E9: execcmd (exec.c:3378)
==10175==    by 0x428CA0: execpline2 (exec.c:1697)
==10175==    by 0x427FD2: execpline (exec.c:1484)
==10175==    by 0x42779A: execlist (exec.c:1275)
==10175==    by 0x42717C: execode (exec.c:1073)
==10175==    by 0x431299: runshfunc (exec.c:5040)
==10175==    by 0x430E76: doshfunc (exec.c:4920)
==10175==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10175== 
==10175== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10182== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10182-by-pythonnut-on-???
==10182== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10182-by-pythonnut-on-???
==10182== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10182-by-pythonnut-on-???
==10182== 
==10182== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10182== don't want to do, unless you know exactly what you're doing,
==10182== or are doing some strange experiment):
==10182==   /usr/lib/valgrind/../../bin/vgdb --pid=10182 ...command...
==10182== 
==10182== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10182==   /path/to/gdb ./zsh
==10182== and then give GDB the following command
==10182==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10182
==10182== --pid is optional if only one valgrind process is running
==10182== 
--10182-- Caught __NR_exit; running __libc_freeres()
==10181== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10181-by-pythonnut-on-???
==10181== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10181-by-pythonnut-on-???
==10181== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10181-by-pythonnut-on-???
==10181== 
==10181== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10181== don't want to do, unless you know exactly what you're doing,
==10181== or are doing some strange experiment):
==10181==   /usr/lib/valgrind/../../bin/vgdb --pid=10181 ...command...
==10181== 
==10181== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10181==   /path/to/gdb ./zsh
==10181== and then give GDB the following command
==10181==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10181
==10181== --pid is optional if only one valgrind process is running
==10181== 
==10183== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10183-by-pythonnut-on-???
==10183== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10183-by-pythonnut-on-???
==10183== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10183-by-pythonnut-on-???
==10183== 
==10183== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10183== don't want to do, unless you know exactly what you're doing,
==10183== or are doing some strange experiment):
==10183==   /usr/lib/valgrind/../../bin/vgdb --pid=10183 ...command...
==10183== 
==10183== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10183==   /path/to/gdb ./zsh
==10183== and then give GDB the following command
==10183==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10183
==10183== --pid is optional if only one valgrind process is running
==10183== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--10182-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10181-- Caught __NR_exit; running __libc_freeres()
==10182== 
==10182== HEAP SUMMARY:
==10182==     in use at exit: 3,137,416 bytes in 69,539 blocks
==10182==   total heap usage: 1,595,178 allocs, 1,525,639 frees, 128,932,119 bytes allocated
==10182== 
--10181-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10181== 
==10182== Searching for pointers to 69,539 not-freed blocks
--10182--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10182--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10182--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10182--   Scanning root segment: 0x4037000..0x403efff (32768)
--10182--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10182--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10182--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10182--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10182--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10182--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10182--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10182--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10182--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10182--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10182--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10182--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10182--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10182--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10182--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10182--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10182--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10182--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10182--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==10181== HEAP SUMMARY:
==10181==     in use at exit: 3,112,296 bytes in 68,931 blocks
==10181==   total heap usage: 1,597,796 allocs, 1,528,865 frees, 129,027,482 bytes allocated
==10181== 
--10182--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10182--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10182--   Scanning root segment: 0x701a000..0x701afff (4096)
--10182--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10182--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10182--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10182--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10182--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10182--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10182--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10182--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10182--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10182--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10181== Searching for pointers to 68,931 not-freed blocks
--10181--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10181--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10181--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10181--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10181--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10181--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10181--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10181--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10181--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10181--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10181--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10181--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10181--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10181--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10181--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10181--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10181--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10181--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10181--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10181--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10181--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10181--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10181--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10181--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10181--   Scanning root segment: 0x701a000..0x701afff (4096)
--10181--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10181--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10181--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10181--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10181--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10181--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10181--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10181--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10181--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10181--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10182== Checked 4,840,024 bytes
==10182== 
==10182== LEAK SUMMARY:
==10182==    definitely lost: 2,221 bytes in 14 blocks
==10182==    indirectly lost: 6,796 bytes in 9 blocks
==10182==      possibly lost: 0 bytes in 0 blocks
==10182==    still reachable: 3,128,399 bytes in 69,516 blocks
==10182==         suppressed: 0 bytes in 0 blocks
==10182== Rerun with --leak-check=full to see details of leaked memory
==10182== 
==10182== Use --track-origins=yes to see where uninitialised values come from
==10182== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10182== 
==10182== 1 errors in context 1 of 2:
==10182== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10182==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10182==    by 0x488CD0: stringsubst (subst.c:301)
==10182==    by 0x48801B: prefork (subst.c:77)
==10182==    by 0x42B318: execcmd (exec.c:2619)
==10182==    by 0x428CA0: execpline2 (exec.c:1697)
==10182==    by 0x427FD2: execpline (exec.c:1484)
==10182==    by 0x427756: execlist (exec.c:1267)
==10182==    by 0x42717C: execode (exec.c:1073)
==10182==    by 0x431299: runshfunc (exec.c:5040)
==10182==    by 0x430E76: doshfunc (exec.c:4920)
==10182==    by 0x4302FB: execshfunc (exec.c:4557)
==10182==    by 0x42D8C1: execcmd (exec.c:3373)
==10182== 
==10182== 
==10182== 2 errors in context 2 of 2:
==10182== Conditional jump or move depends on uninitialised value(s)
==10182==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10182==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10182==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10182==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10182==    by 0x42D8E9: execcmd (exec.c:3378)
==10182==    by 0x428CA0: execpline2 (exec.c:1697)
==10182==    by 0x427FD2: execpline (exec.c:1484)
==10182==    by 0x42779A: execlist (exec.c:1275)
==10182==    by 0x42717C: execode (exec.c:1073)
==10182==    by 0x431299: runshfunc (exec.c:5040)
==10182==    by 0x430E76: doshfunc (exec.c:4920)
==10182==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10182== 
==10182== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10180== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10180-by-pythonnut-on-???
==10180== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10180-by-pythonnut-on-???
==10180== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10180-by-pythonnut-on-???
==10180== 
==10180== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10180== don't want to do, unless you know exactly what you're doing,
==10180== or are doing some strange experiment):
==10180==   /usr/lib/valgrind/../../bin/vgdb --pid=10180 ...command...
==10180== 
==10180== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10180==   /path/to/gdb ./zsh
==10180== and then give GDB the following command
==10180==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10180
==10180== --pid is optional if only one valgrind process is running
==10180== 
--10180-- Caught __NR_exit; running __libc_freeres()
==10181== Checked 4,769,792 bytes
==10181== 
==10181== LEAK SUMMARY:
==10181==    definitely lost: 2,197 bytes in 13 blocks
==10181==    indirectly lost: 6,756 bytes in 7 blocks
==10181==      possibly lost: 0 bytes in 0 blocks
==10181==    still reachable: 3,103,343 bytes in 68,911 blocks
==10181==         suppressed: 0 bytes in 0 blocks
==10181== Rerun with --leak-check=full to see details of leaked memory
==10181== 
==10181== Use --track-origins=yes to see where uninitialised values come from
==10181== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10181== 
==10181== 1 errors in context 1 of 2:
==10181== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10181==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10181==    by 0x488CD0: stringsubst (subst.c:301)
==10181==    by 0x48801B: prefork (subst.c:77)
==10181==    by 0x42B318: execcmd (exec.c:2619)
==10181==    by 0x428CA0: execpline2 (exec.c:1697)
==10181==    by 0x427FD2: execpline (exec.c:1484)
==10181==    by 0x427756: execlist (exec.c:1267)
==10181==    by 0x42717C: execode (exec.c:1073)
==10181==    by 0x431299: runshfunc (exec.c:5040)
==10181==    by 0x430E76: doshfunc (exec.c:4920)
==10181==    by 0x4302FB: execshfunc (exec.c:4557)
==10181==    by 0x42D8C1: execcmd (exec.c:3373)
==10181== 
==10181== 
==10181== 2 errors in context 2 of 2:
==10181== Conditional jump or move depends on uninitialised value(s)
==10181==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10181==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10181==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10181==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10181==    by 0x42D8E9: execcmd (exec.c:3378)
==10181==    by 0x428CA0: execpline2 (exec.c:1697)
==10181==    by 0x427FD2: execpline (exec.c:1484)
==10181==    by 0x42779A: execlist (exec.c:1275)
==10181==    by 0x42717C: execode (exec.c:1073)
==10181==    by 0x431299: runshfunc (exec.c:5040)
==10181==    by 0x430E76: doshfunc (exec.c:4920)
==10181==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10181== 
==10181== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10180-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10180== 
==10180== HEAP SUMMARY:
==10180==     in use at exit: 3,137,352 bytes in 69,536 blocks
==10180==   total heap usage: 1,595,180 allocs, 1,525,644 frees, 128,932,663 bytes allocated
==10180== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
==10180== Searching for pointers to 69,536 not-freed blocks
--10180--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10180--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10180--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10180--   Scanning root segment: 0x4037000..0x403efff (32768)
--10180--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10180--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10180--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10180--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10180--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10180--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10180--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10180--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10180--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10180--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10180--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10180--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10180--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10180--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10180--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10180--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10180--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10180--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10180--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10180--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10180--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10180--   Scanning root segment: 0x701a000..0x701afff (4096)
--10180--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10180--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10180--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10180--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10180--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10180--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10180--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10180--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10180--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10180--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10187-- Caught __NR_exit; running __libc_freeres()
==10187== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10187-by-pythonnut-on-???
==10187== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10187-by-pythonnut-on-???
==10187== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10187-by-pythonnut-on-???
==10187== 
==10187== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10187== don't want to do, unless you know exactly what you're doing,
==10187== or are doing some strange experiment):
==10187==   /usr/lib/valgrind/../../bin/vgdb --pid=10187 ...command...
==10187== 
==10187== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10187==   /path/to/gdb ./zsh
==10187== and then give GDB the following command
==10187==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10187
==10187== --pid is optional if only one valgrind process is running
==10187== 
--10187-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10187== 
==10187== HEAP SUMMARY:
==10187==     in use at exit: 3,112,403 bytes in 68,935 blocks
==10187==   total heap usage: 1,597,804 allocs, 1,528,869 frees, 129,029,701 bytes allocated
==10187== 
==10187== Searching for pointers to 68,935 not-freed blocks
--10187--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10187--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10187--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10187--   Scanning root segment: 0x4037000..0x403afff (16384)
--10187--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10187--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10187--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10187--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10187--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10187--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10187--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10187--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10187--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10187--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10187--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10187--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10187--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10187--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10187--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10187--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10187--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10187--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10187--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10187--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10187--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10187--   Scanning root segment: 0x701a000..0x701afff (4096)
--10187--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10187--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10187--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10187--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10187--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10187--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10187--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10187--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10187--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10187--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10180== Checked 4,839,336 bytes
==10180== 
==10180== LEAK SUMMARY:
==10180==    definitely lost: 2,221 bytes in 14 blocks
==10180==    indirectly lost: 6,796 bytes in 9 blocks
==10180==      possibly lost: 0 bytes in 0 blocks
==10180==    still reachable: 3,128,335 bytes in 69,513 blocks
==10180==         suppressed: 0 bytes in 0 blocks
==10180== Rerun with --leak-check=full to see details of leaked memory
==10180== 
==10180== Use --track-origins=yes to see where uninitialised values come from
==10180== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10180== 
==10180== 1 errors in context 1 of 2:
==10180== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10180==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10180==    by 0x488CD0: stringsubst (subst.c:301)
==10180==    by 0x48801B: prefork (subst.c:77)
==10180==    by 0x42B318: execcmd (exec.c:2619)
==10180==    by 0x428CA0: execpline2 (exec.c:1697)
==10180==    by 0x427FD2: execpline (exec.c:1484)
==10180==    by 0x427756: execlist (exec.c:1267)
==10180==    by 0x42717C: execode (exec.c:1073)
==10180==    by 0x431299: runshfunc (exec.c:5040)
==10180==    by 0x430E76: doshfunc (exec.c:4920)
==10180==    by 0x4302FB: execshfunc (exec.c:4557)
==10180==    by 0x42D8C1: execcmd (exec.c:3373)
==10180== 
==10180== 
==10180== 2 errors in context 2 of 2:
==10180== Conditional jump or move depends on uninitialised value(s)
==10180==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10180==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10180==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10180==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10180==    by 0x42D8E9: execcmd (exec.c:3378)
==10180==    by 0x428CA0: execpline2 (exec.c:1697)
==10180==    by 0x427FD2: execpline (exec.c:1484)
==10180==    by 0x42779A: execlist (exec.c:1275)
==10180==    by 0x42717C: execode (exec.c:1073)
==10180==    by 0x431299: runshfunc (exec.c:5040)
==10180==    by 0x430E76: doshfunc (exec.c:4920)
==10180==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10180== 
==10180== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10189-by-pythonnut-on-???
==10189== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10189-by-pythonnut-on-???
==10189== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10189-by-pythonnut-on-???
==10189== 
==10189== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10189== don't want to do, unless you know exactly what you're doing,
==10189== or are doing some strange experiment):
==10189==   /usr/lib/valgrind/../../bin/vgdb --pid=10189 ...command...
==10189== 
==10189== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10189==   /path/to/gdb ./zsh
==10189== and then give GDB the following command
==10189==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10189
==10189== --pid is optional if only one valgrind process is running
==10189== 
--10189-- Caught __NR_exit; running __libc_freeres()
--10189-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10187== Checked 4,786,544 bytes
==10187== 
==10189== 
==10189== HEAP SUMMARY:
==10189==     in use at exit: 3,137,356 bytes in 69,536 blocks
==10189==   total heap usage: 1,595,197 allocs, 1,525,661 frees, 128,937,683 bytes allocated
==10189== 
==10187== LEAK SUMMARY:
==10187==    definitely lost: 2,197 bytes in 13 blocks
==10187==    indirectly lost: 6,756 bytes in 7 blocks
==10187==      possibly lost: 0 bytes in 0 blocks
==10187==    still reachable: 3,103,450 bytes in 68,915 blocks
==10187==         suppressed: 0 bytes in 0 blocks
==10187== Rerun with --leak-check=full to see details of leaked memory
==10187== 
==10187== Use --track-origins=yes to see where uninitialised values come from
==10187== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10187== 
==10187== 1 errors in context 1 of 2:
==10187== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10187==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10187==    by 0x488CD0: stringsubst (subst.c:301)
==10187==    by 0x48801B: prefork (subst.c:77)
==10187==    by 0x42B318: execcmd (exec.c:2619)
==10187==    by 0x428CA0: execpline2 (exec.c:1697)
==10187==    by 0x427FD2: execpline (exec.c:1484)
==10187==    by 0x427756: execlist (exec.c:1267)
==10187==    by 0x42717C: execode (exec.c:1073)
==10187==    by 0x431299: runshfunc (exec.c:5040)
==10187==    by 0x430E76: doshfunc (exec.c:4920)
==10187==    by 0x4302FB: execshfunc (exec.c:4557)
==10187==    by 0x42D8C1: execcmd (exec.c:3373)
==10187== 
==10187== 
==10187== 2 errors in context 2 of 2:
==10187== Conditional jump or move depends on uninitialised value(s)
==10187==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10187==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10187==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10187==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10187==    by 0x42D8E9: execcmd (exec.c:3378)
==10187==    by 0x428CA0: execpline2 (exec.c:1697)
==10187==    by 0x427FD2: execpline (exec.c:1484)
==10187==    by 0x42779A: execlist (exec.c:1275)
==10187==    by 0x42717C: execode (exec.c:1073)
==10187==    by 0x431299: runshfunc (exec.c:5040)
==10187==    by 0x430E76: doshfunc (exec.c:4920)
==10187==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10187== 
==10187== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== Searching for pointers to 69,536 not-freed blocks
--10189--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10189--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10189--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10189--   Scanning root segment: 0x4037000..0x403efff (32768)
--10189--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10189--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10189--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10189--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10189--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10189--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10189--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10189--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10189--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10189--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10189--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10189--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10189--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10189--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10189--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10189--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10189--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10190== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10190-by-pythonnut-on-???
==10190== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10190-by-pythonnut-on-???
==10190== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10190-by-pythonnut-on-???
==10190== 
==10190== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10190== don't want to do, unless you know exactly what you're doing,
==10190== or are doing some strange experiment):
==10190==   /usr/lib/valgrind/../../bin/vgdb --pid=10190 ...command...
==10190== 
==10190== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10190==   /path/to/gdb ./zsh
==10190== and then give GDB the following command
==10190==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10190
==10190== --pid is optional if only one valgrind process is running
==10190== 
--10189--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10189--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10189--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10189--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10189--   Scanning root segment: 0x701a000..0x701afff (4096)
--10189--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10189--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10189--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10189--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10189--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10189--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10189--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10189--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10189--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10189--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--10192-- Caught __NR_exit; running __libc_freeres()
==10192== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10192-by-pythonnut-on-???
==10192== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10192-by-pythonnut-on-???
==10192== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10192-by-pythonnut-on-???
==10192== 
==10192== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10192== don't want to do, unless you know exactly what you're doing,
==10192== or are doing some strange experiment):
==10192==   /usr/lib/valgrind/../../bin/vgdb --pid=10192 ...command...
==10192== 
==10192== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10192==   /path/to/gdb ./zsh
==10192== and then give GDB the following command
==10192==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10192
==10192== --pid is optional if only one valgrind process is running
==10192== 
--10192-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10189== Checked 4,839,344 bytes
==10189== 
==10192== 
==10192== HEAP SUMMARY:
==10192==     in use at exit: 3,111,710 bytes in 68,918 blocks
==10192==   total heap usage: 1,597,854 allocs, 1,528,936 frees, 129,036,602 bytes allocated
==10192== 
==10189== LEAK SUMMARY:
==10189==    definitely lost: 2,221 bytes in 14 blocks
==10189==    indirectly lost: 6,796 bytes in 9 blocks
==10189==      possibly lost: 0 bytes in 0 blocks
==10189==    still reachable: 3,128,339 bytes in 69,513 blocks
==10189==         suppressed: 0 bytes in 0 blocks
==10189== Rerun with --leak-check=full to see details of leaked memory
==10189== 
==10189== Use --track-origins=yes to see where uninitialised values come from
==10189== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== 
==10189== 1 errors in context 1 of 2:
==10189== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10189==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10189==    by 0x488CD0: stringsubst (subst.c:301)
==10189==    by 0x48801B: prefork (subst.c:77)
==10189==    by 0x42B318: execcmd (exec.c:2619)
==10189==    by 0x428CA0: execpline2 (exec.c:1697)
==10189==    by 0x427FD2: execpline (exec.c:1484)
==10189==    by 0x427756: execlist (exec.c:1267)
==10189==    by 0x42717C: execode (exec.c:1073)
==10189==    by 0x431299: runshfunc (exec.c:5040)
==10189==    by 0x430E76: doshfunc (exec.c:4920)
==10189==    by 0x4302FB: execshfunc (exec.c:4557)
==10189==    by 0x42D8C1: execcmd (exec.c:3373)
==10189== 
==10189== 
==10189== 2 errors in context 2 of 2:
==10189== Conditional jump or move depends on uninitialised value(s)
==10189==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10189==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10189==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10189==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10189==    by 0x42D8E9: execcmd (exec.c:3378)
==10189==    by 0x428CA0: execpline2 (exec.c:1697)
==10189==    by 0x427FD2: execpline (exec.c:1484)
==10189==    by 0x42779A: execlist (exec.c:1275)
==10189==    by 0x42717C: execode (exec.c:1073)
==10189==    by 0x431299: runshfunc (exec.c:5040)
==10189==    by 0x430E76: doshfunc (exec.c:4920)
==10189==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10189== 
==10189== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10193== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10193-by-pythonnut-on-???
==10193== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10193-by-pythonnut-on-???
==10193== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10193-by-pythonnut-on-???
==10193== 
==10193== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10193== don't want to do, unless you know exactly what you're doing,
==10193== or are doing some strange experiment):
==10193==   /usr/lib/valgrind/../../bin/vgdb --pid=10193 ...command...
==10193== 
==10193== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10193==   /path/to/gdb ./zsh
==10193== and then give GDB the following command
==10193==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10193
==10193== --pid is optional if only one valgrind process is running
==10193== 
==10192== Searching for pointers to 68,918 not-freed blocks
--10192--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10192--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10192--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10192--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10192--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10192--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10192--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10192--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10192--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10192--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10192--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10192--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10192--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10192--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10192--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10192--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10192--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10192--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10192--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10192--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10192--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10192--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10192--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10192--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10192--   Scanning root segment: 0x701a000..0x701afff (4096)
--10192--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10192--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10192--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10192--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10192--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10192--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10192--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10192--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10192--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10192--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10193-- Caught __NR_exit; running __libc_freeres()
--10193-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10193== 
==10193== HEAP SUMMARY:
==10193==     in use at exit: 3,137,355 bytes in 69,536 blocks
==10193==   total heap usage: 1,595,202 allocs, 1,525,666 frees, 128,939,796 bytes allocated
==10193== 
==10193== Searching for pointers to 69,536 not-freed blocks
--10193--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10193--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10193--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10193--   Scanning root segment: 0x4037000..0x403efff (32768)
--10193--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10193--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10193--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10193--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10193--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10193--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10193--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10193--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10193--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10193--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10193--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10193--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10193--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10193--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10193--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10193--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10193--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10193--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10193--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10193--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10193--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10193--   Scanning root segment: 0x701a000..0x701afff (4096)
--10193--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10193--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10193--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10193--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10193--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10193--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10193--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10193--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10193--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10193--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10192== Checked 4,786,720 bytes
==10192== 
==10192== LEAK SUMMARY:
==10192==    definitely lost: 2,197 bytes in 13 blocks
==10192==    indirectly lost: 6,756 bytes in 7 blocks
==10192==      possibly lost: 0 bytes in 0 blocks
==10192==    still reachable: 3,102,757 bytes in 68,898 blocks
==10192==         suppressed: 0 bytes in 0 blocks
==10192== Rerun with --leak-check=full to see details of leaked memory
==10192== 
==10192== Use --track-origins=yes to see where uninitialised values come from
==10192== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10192== 
==10192== 1 errors in context 1 of 2:
==10192== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10192==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10192==    by 0x488CD0: stringsubst (subst.c:301)
==10192==    by 0x48801B: prefork (subst.c:77)
==10192==    by 0x42B318: execcmd (exec.c:2619)
==10192==    by 0x428CA0: execpline2 (exec.c:1697)
==10192==    by 0x427FD2: execpline (exec.c:1484)
==10192==    by 0x427756: execlist (exec.c:1267)
==10192==    by 0x42717C: execode (exec.c:1073)
==10192==    by 0x431299: runshfunc (exec.c:5040)
==10192==    by 0x430E76: doshfunc (exec.c:4920)
==10192==    by 0x4302FB: execshfunc (exec.c:4557)
==10192==    by 0x42D8C1: execcmd (exec.c:3373)
==10192== 
==10192== 
==10192== 2 errors in context 2 of 2:
==10192== Conditional jump or move depends on uninitialised value(s)
==10192==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10192==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10192==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10192==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10192==    by 0x42D8E9: execcmd (exec.c:3378)
==10192==    by 0x428CA0: execpline2 (exec.c:1697)
==10192==    by 0x427FD2: execpline (exec.c:1484)
==10192==    by 0x42779A: execlist (exec.c:1275)
==10192==    by 0x42717C: execode (exec.c:1073)
==10192==    by 0x431299: runshfunc (exec.c:5040)
==10192==    by 0x430E76: doshfunc (exec.c:4920)
==10192==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10192== 
==10192== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF617C,  len 4
==10193== Checked 4,839,344 bytes
==10193== 
==10195== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10195-by-pythonnut-on-???
==10195== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10195-by-pythonnut-on-???
==10195== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10195-by-pythonnut-on-???
==10195== 
==10195== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10195== don't want to do, unless you know exactly what you're doing,
==10195== or are doing some strange experiment):
==10195==   /usr/lib/valgrind/../../bin/vgdb --pid=10195 ...command...
==10195== 
==10195== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10195==   /path/to/gdb ./zsh
==10195== and then give GDB the following command
==10195==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10195
==10195== --pid is optional if only one valgrind process is running
==10195== 
==10193== LEAK SUMMARY:
==10193==    definitely lost: 2,221 bytes in 14 blocks
==10193==    indirectly lost: 6,796 bytes in 9 blocks
==10193==      possibly lost: 0 bytes in 0 blocks
==10193==    still reachable: 3,128,338 bytes in 69,513 blocks
==10193==         suppressed: 0 bytes in 0 blocks
==10193== Rerun with --leak-check=full to see details of leaked memory
==10193== 
==10193== Use --track-origins=yes to see where uninitialised values come from
==10193== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10193== 
==10193== 1 errors in context 1 of 2:
==10193== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10193==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10193==    by 0x488CD0: stringsubst (subst.c:301)
==10193==    by 0x48801B: prefork (subst.c:77)
==10193==    by 0x42B318: execcmd (exec.c:2619)
==10193==    by 0x428CA0: execpline2 (exec.c:1697)
==10193==    by 0x427FD2: execpline (exec.c:1484)
==10193==    by 0x427756: execlist (exec.c:1267)
==10193==    by 0x42717C: execode (exec.c:1073)
==10193==    by 0x431299: runshfunc (exec.c:5040)
==10193==    by 0x430E76: doshfunc (exec.c:4920)
==10193==    by 0x4302FB: execshfunc (exec.c:4557)
==10193==    by 0x42D8C1: execcmd (exec.c:3373)
==10193== 
==10193== 
==10193== 2 errors in context 2 of 2:
==10193== Conditional jump or move depends on uninitialised value(s)
==10193==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10193==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10193==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10193==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10193==    by 0x42D8E9: execcmd (exec.c:3378)
==10193==    by 0x428CA0: execpline2 (exec.c:1697)
==10193==    by 0x427FD2: execpline (exec.c:1484)
==10193==    by 0x42779A: execlist (exec.c:1275)
==10193==    by 0x42717C: execode (exec.c:1073)
==10193==    by 0x431299: runshfunc (exec.c:5040)
==10193==    by 0x430E76: doshfunc (exec.c:4920)
==10193==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10193== 
==10193== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10197-by-pythonnut-on-???
==10197== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10197-by-pythonnut-on-???
==10197== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10197-by-pythonnut-on-???
==10197== 
==10197== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10197== don't want to do, unless you know exactly what you're doing,
==10197== or are doing some strange experiment):
==10197==   /usr/lib/valgrind/../../bin/vgdb --pid=10197 ...command...
==10197== 
==10197== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10197==   /path/to/gdb ./zsh
==10197== and then give GDB the following command
==10197==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10197
==10197== --pid is optional if only one valgrind process is running
==10197== 
==10198== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10198-by-pythonnut-on-???
==10198== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10198-by-pythonnut-on-???
==10198== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10198-by-pythonnut-on-???
==10198== 
==10198== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10198== don't want to do, unless you know exactly what you're doing,
==10198== or are doing some strange experiment):
==10198==   /usr/lib/valgrind/../../bin/vgdb --pid=10198 ...command...
==10198== 
==10198== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10198==   /path/to/gdb ./zsh
==10198== and then give GDB the following command
==10198==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10198
==10198== --pid is optional if only one valgrind process is running
==10198== 
--10198-- Caught __NR_exit; running __libc_freeres()
==10200== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10200-by-pythonnut-on-???
==10200== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10200-by-pythonnut-on-???
==10200== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10200-by-pythonnut-on-???
==10200== 
==10200== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10200== don't want to do, unless you know exactly what you're doing,
==10200== or are doing some strange experiment):
==10200==   /usr/lib/valgrind/../../bin/vgdb --pid=10200 ...command...
==10200== 
==10200== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10200==   /path/to/gdb ./zsh
==10200== and then give GDB the following command
==10200==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10200
==10200== --pid is optional if only one valgrind process is running
==10200== 
==10199== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10199-by-pythonnut-on-???
==10199== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10199-by-pythonnut-on-???
==10199== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10199-by-pythonnut-on-???
==10199== 
==10199== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10199== don't want to do, unless you know exactly what you're doing,
==10199== or are doing some strange experiment):
==10199==   /usr/lib/valgrind/../../bin/vgdb --pid=10199 ...command...
==10199== 
==10199== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10199==   /path/to/gdb ./zsh
==10199== and then give GDB the following command
==10199==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10199
==10199== --pid is optional if only one valgrind process is running
==10199== 
--10199-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==10203== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10203-by-pythonnut-on-???
==10203== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10203-by-pythonnut-on-???
==10203== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10203-by-pythonnut-on-???
==10203== 
==10203== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10203== don't want to do, unless you know exactly what you're doing,
==10203== or are doing some strange experiment):
==10203==   /usr/lib/valgrind/../../bin/vgdb --pid=10203 ...command...
==10203== 
==10203== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10203==   /path/to/gdb ./zsh
==10203== and then give GDB the following command
==10203==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10203
==10203== --pid is optional if only one valgrind process is running
==10203== 
--10198-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--10199-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10198== 
==10198== HEAP SUMMARY:
==10198==     in use at exit: 3,137,354 bytes in 69,536 blocks
==10198==   total heap usage: 1,595,207 allocs, 1,525,671 frees, 128,941,909 bytes allocated
==10198== 
==10202== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10202-by-pythonnut-on-???
==10202== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10202-by-pythonnut-on-???
==10202== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10202-by-pythonnut-on-???
==10202== 
==10202== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10202== don't want to do, unless you know exactly what you're doing,
==10202== or are doing some strange experiment):
==10202==   /usr/lib/valgrind/../../bin/vgdb --pid=10202 ...command...
==10202== 
==10202== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10202==   /path/to/gdb ./zsh
==10202== and then give GDB the following command
==10202==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10202
==10202== --pid is optional if only one valgrind process is running
==10202== 
==10199== 
--10202-- Caught __NR_exit; running __libc_freeres()
==10199== HEAP SUMMARY:
==10199==     in use at exit: 3,112,786 bytes in 68,971 blocks
==10199==   total heap usage: 1,598,090 allocs, 1,529,119 frees, 129,059,014 bytes allocated
==10199== 
==10198== Searching for pointers to 69,536 not-freed blocks
--10198--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10198--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10198--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10198--   Scanning root segment: 0x4037000..0x403efff (32768)
--10198--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10198--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10198--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10198--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10198--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10198--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10198--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10198--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10198--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10198--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10198--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10198--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10198--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10198--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10198--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10198--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10198--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10198--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10198--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10198--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10198--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10198--   Scanning root segment: 0x701a000..0x701afff (4096)
--10198--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10198--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10198--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10198--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10198--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10198--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10198--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10198--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10198--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10198--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10199== Searching for pointers to 68,971 not-freed blocks
--10199--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10199--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10199--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10199--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10199--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10199--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10199--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10199--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10199--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10199--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10199--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10199--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10199--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10199--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10199--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10199--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10199--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10199--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10199--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10199--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10199--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10199--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10199--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10199--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10199--   Scanning root segment: 0x701a000..0x701afff (4096)
--10199--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10199--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10199--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10199--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10199--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10199--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10199--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10199--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10199--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10199--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10202-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10202== 
==10202== HEAP SUMMARY:
==10202==     in use at exit: 3,113,975 bytes in 68,960 blocks
==10202==   total heap usage: 1,598,076 allocs, 1,529,116 frees, 129,169,912 bytes allocated
==10202== 
==10202== Searching for pointers to 68,960 not-freed blocks
--10202--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10202--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10202--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10202--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10202--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10202--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10202--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10202--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10202--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10202--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10202--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10202--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10202--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10202--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10202--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10202--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10202--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10202--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10202--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10202--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10202--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10202--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10202--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10202--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10202--   Scanning root segment: 0x701a000..0x701afff (4096)
--10202--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10202--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10202--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10202--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10202--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10202--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10202--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10202--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10202--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10202--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10198== Checked 4,839,344 bytes
==10198== 
==10199== Checked 4,789,064 bytes
==10199== 
==10198== LEAK SUMMARY:
==10198==    definitely lost: 2,221 bytes in 14 blocks
==10198==    indirectly lost: 6,796 bytes in 9 blocks
==10198==      possibly lost: 0 bytes in 0 blocks
==10198==    still reachable: 3,128,337 bytes in 69,513 blocks
==10198==         suppressed: 0 bytes in 0 blocks
==10198== Rerun with --leak-check=full to see details of leaked memory
==10198== 
==10198== Use --track-origins=yes to see where uninitialised values come from
==10198== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10198== 
==10198== 1 errors in context 1 of 2:
==10198== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10198==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10198==    by 0x488CD0: stringsubst (subst.c:301)
==10198==    by 0x48801B: prefork (subst.c:77)
==10198==    by 0x42B318: execcmd (exec.c:2619)
==10198==    by 0x428CA0: execpline2 (exec.c:1697)
==10198==    by 0x427FD2: execpline (exec.c:1484)
==10198==    by 0x427756: execlist (exec.c:1267)
==10198==    by 0x42717C: execode (exec.c:1073)
==10198==    by 0x431299: runshfunc (exec.c:5040)
==10198==    by 0x430E76: doshfunc (exec.c:4920)
==10198==    by 0x4302FB: execshfunc (exec.c:4557)
==10198==    by 0x42D8C1: execcmd (exec.c:3373)
==10198== 
==10198== 
==10198== 2 errors in context 2 of 2:
==10198== Conditional jump or move depends on uninitialised value(s)
==10198==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10198==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10198==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10198==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10198==    by 0x42D8E9: execcmd (exec.c:3378)
==10198==    by 0x428CA0: execpline2 (exec.c:1697)
==10198==    by 0x427FD2: execpline (exec.c:1484)
==10198==    by 0x42779A: execlist (exec.c:1275)
==10198==    by 0x42717C: execode (exec.c:1073)
==10198==    by 0x431299: runshfunc (exec.c:5040)
==10198==    by 0x430E76: doshfunc (exec.c:4920)
==10198==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10198== 
==10198== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10206-by-pythonnut-on-???
==10206== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10206-by-pythonnut-on-???
==10206== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10206-by-pythonnut-on-???
==10206== 
==10206== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10206== don't want to do, unless you know exactly what you're doing,
==10206== or are doing some strange experiment):
==10206==   /usr/lib/valgrind/../../bin/vgdb --pid=10206 ...command...
==10206== 
==10206== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10206==   /path/to/gdb ./zsh
==10206== and then give GDB the following command
==10206==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10206
==10206== --pid is optional if only one valgrind process is running
==10206== 
==10199== LEAK SUMMARY:
==10199==    definitely lost: 2,197 bytes in 13 blocks
==10199==    indirectly lost: 6,756 bytes in 7 blocks
==10199==      possibly lost: 0 bytes in 0 blocks
==10199==    still reachable: 3,103,833 bytes in 68,951 blocks
==10199==         suppressed: 0 bytes in 0 blocks
==10199== Rerun with --leak-check=full to see details of leaked memory
==10199== 
==10199== Use --track-origins=yes to see where uninitialised values come from
==10199== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10199== 
==10199== 1 errors in context 1 of 2:
==10199== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10199==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10199==    by 0x488CD0: stringsubst (subst.c:301)
==10199==    by 0x48801B: prefork (subst.c:77)
==10199==    by 0x42B318: execcmd (exec.c:2619)
==10199==    by 0x428CA0: execpline2 (exec.c:1697)
==10199==    by 0x427FD2: execpline (exec.c:1484)
==10199==    by 0x427756: execlist (exec.c:1267)
==10199==    by 0x42717C: execode (exec.c:1073)
==10199==    by 0x431299: runshfunc (exec.c:5040)
==10199==    by 0x430E76: doshfunc (exec.c:4920)
==10199==    by 0x4302FB: execshfunc (exec.c:4557)
==10199==    by 0x42D8C1: execcmd (exec.c:3373)
==10199== 
==10199== 
==10199== 2 errors in context 2 of 2:
==10199== Conditional jump or move depends on uninitialised value(s)
==10199==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10199==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10199==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10199==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10199==    by 0x42D8E9: execcmd (exec.c:3378)
==10199==    by 0x428CA0: execpline2 (exec.c:1697)
==10199==    by 0x427FD2: execpline (exec.c:1484)
==10199==    by 0x42779A: execlist (exec.c:1275)
==10199==    by 0x42717C: execode (exec.c:1073)
==10199==    by 0x431299: runshfunc (exec.c:5040)
==10199==    by 0x430E76: doshfunc (exec.c:4920)
==10199==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10199== 
==10199== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10206-- Caught __NR_exit; running __libc_freeres()
--10196-- Caught __NR_exit; running __libc_freeres()
==10196== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10196-by-pythonnut-on-???
==10196== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10196-by-pythonnut-on-???
==10196== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10196-by-pythonnut-on-???
==10196== 
==10196== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10196== don't want to do, unless you know exactly what you're doing,
==10196== or are doing some strange experiment):
==10196==   /usr/lib/valgrind/../../bin/vgdb --pid=10196 ...command...
==10196== 
==10196== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10196==   /path/to/gdb ./zsh
==10196== and then give GDB the following command
==10196==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10196
==10196== --pid is optional if only one valgrind process is running
==10196== 
==10202== Checked 4,774,928 bytes
==10202== 
--10206-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10196-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10202== LEAK SUMMARY:
==10202==    definitely lost: 2,197 bytes in 13 blocks
==10202==    indirectly lost: 6,756 bytes in 7 blocks
==10202==      possibly lost: 0 bytes in 0 blocks
==10202==    still reachable: 3,105,022 bytes in 68,940 blocks
==10202==         suppressed: 0 bytes in 0 blocks
==10202== Rerun with --leak-check=full to see details of leaked memory
==10202== 
==10202== Use --track-origins=yes to see where uninitialised values come from
==10202== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10202== 
==10202== 1 errors in context 1 of 2:
==10202== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10202==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10202==    by 0x488CD0: stringsubst (subst.c:301)
==10202==    by 0x48801B: prefork (subst.c:77)
==10202==    by 0x42B318: execcmd (exec.c:2619)
==10202==    by 0x428CA0: execpline2 (exec.c:1697)
==10202==    by 0x427FD2: execpline (exec.c:1484)
==10202==    by 0x427756: execlist (exec.c:1267)
==10202==    by 0x42717C: execode (exec.c:1073)
==10202==    by 0x431299: runshfunc (exec.c:5040)
==10202==    by 0x430E76: doshfunc (exec.c:4920)
==10202==    by 0x4302FB: execshfunc (exec.c:4557)
==10202==    by 0x42D8C1: execcmd (exec.c:3373)
==10202== 
==10202== 
==10202== 2 errors in context 2 of 2:
==10202== Conditional jump or move depends on uninitialised value(s)
==10202==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10202==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10202==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10202==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10202==    by 0x42D8E9: execcmd (exec.c:3378)
==10202==    by 0x428CA0: execpline2 (exec.c:1697)
==10202==    by 0x427FD2: execpline (exec.c:1484)
==10202==    by 0x42779A: execlist (exec.c:1275)
==10202==    by 0x42717C: execode (exec.c:1073)
==10202==    by 0x431299: runshfunc (exec.c:5040)
==10202==    by 0x430E76: doshfunc (exec.c:4920)
==10202==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10202== 
==10202== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== 
==10196== 
==10206== HEAP SUMMARY:
==10206==     in use at exit: 3,137,353 bytes in 69,536 blocks
==10206==   total heap usage: 1,595,212 allocs, 1,525,676 frees, 128,944,022 bytes allocated
==10206== 
==10196== HEAP SUMMARY:
==10196==     in use at exit: 3,112,722 bytes in 68,968 blocks
==10196==   total heap usage: 1,598,088 allocs, 1,529,120 frees, 129,058,773 bytes allocated
==10196== 
client request: code 4d430005,  addr 0xFFEFF073C,  len 4
==10196== Searching for pointers to 68,968 not-freed blocks
--10196--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10196--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10196--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10196--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10196--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10196--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10196--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10196--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10196--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10196--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10196--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10196--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10196--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10196--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10196--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10196--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10196--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10196--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10196--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10196--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10196--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10196--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10196--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10196--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10196--   Scanning root segment: 0x701a000..0x701afff (4096)
--10196--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10196--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10196--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10196--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10196--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10196--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10196--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10196--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10196--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10196--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10206== Searching for pointers to 69,536 not-freed blocks
--10206--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10206--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10206--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10206--   Scanning root segment: 0x4037000..0x403efff (32768)
--10206--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10206--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10206--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10206--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10206--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10206--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10206--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10206--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10206--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10206--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10206--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10206--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10206--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10206--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10206--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10206--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10206--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10206--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10206--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10206--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10206--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10206--   Scanning root segment: 0x701a000..0x701afff (4096)
--10206--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10206--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10206--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10206--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10206--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10206--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10206--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10206--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10206--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10206--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10196== Checked 4,788,376 bytes
==10196== 
==10206== Checked 4,839,344 bytes
==10206== 
==10196== LEAK SUMMARY:
==10196==    definitely lost: 2,197 bytes in 13 blocks
==10196==    indirectly lost: 6,756 bytes in 7 blocks
==10196==      possibly lost: 0 bytes in 0 blocks
==10196==    still reachable: 3,103,769 bytes in 68,948 blocks
==10196==         suppressed: 0 bytes in 0 blocks
==10196== Rerun with --leak-check=full to see details of leaked memory
==10196== 
==10196== Use --track-origins=yes to see where uninitialised values come from
==10196== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10196== 
==10196== 1 errors in context 1 of 2:
==10196== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10196==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10196==    by 0x488CD0: stringsubst (subst.c:301)
==10196==    by 0x48801B: prefork (subst.c:77)
==10196==    by 0x42B318: execcmd (exec.c:2619)
==10196==    by 0x428CA0: execpline2 (exec.c:1697)
==10196==    by 0x427FD2: execpline (exec.c:1484)
==10196==    by 0x427756: execlist (exec.c:1267)
==10196==    by 0x42717C: execode (exec.c:1073)
==10196==    by 0x431299: runshfunc (exec.c:5040)
==10196==    by 0x430E76: doshfunc (exec.c:4920)
==10196==    by 0x4302FB: execshfunc (exec.c:4557)
==10196==    by 0x42D8C1: execcmd (exec.c:3373)
==10196== 
==10196== 
==10196== 2 errors in context 2 of 2:
==10196== Conditional jump or move depends on uninitialised value(s)
==10196==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10196==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10196==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10196==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10196==    by 0x42D8E9: execcmd (exec.c:3378)
==10196==    by 0x428CA0: execpline2 (exec.c:1697)
==10196==    by 0x427FD2: execpline (exec.c:1484)
==10196==    by 0x42779A: execlist (exec.c:1275)
==10196==    by 0x42717C: execode (exec.c:1073)
==10196==    by 0x431299: runshfunc (exec.c:5040)
==10196==    by 0x430E76: doshfunc (exec.c:4920)
==10196==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10196== 
==10196== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10207-- Caught __NR_exit; running __libc_freeres()
==10206== LEAK SUMMARY:
==10206==    definitely lost: 2,221 bytes in 14 blocks
==10206==    indirectly lost: 6,796 bytes in 9 blocks
==10206==      possibly lost: 0 bytes in 0 blocks
==10206==    still reachable: 3,128,336 bytes in 69,513 blocks
==10206==         suppressed: 0 bytes in 0 blocks
==10206== Rerun with --leak-check=full to see details of leaked memory
==10206== 
==10206== Use --track-origins=yes to see where uninitialised values come from
==10206== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== 
==10206== 1 errors in context 1 of 2:
==10206== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10206==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10206==    by 0x488CD0: stringsubst (subst.c:301)
==10206==    by 0x48801B: prefork (subst.c:77)
==10206==    by 0x42B318: execcmd (exec.c:2619)
==10206==    by 0x428CA0: execpline2 (exec.c:1697)
==10206==    by 0x427FD2: execpline (exec.c:1484)
==10206==    by 0x427756: execlist (exec.c:1267)
==10206==    by 0x42717C: execode (exec.c:1073)
==10206==    by 0x431299: runshfunc (exec.c:5040)
==10206==    by 0x430E76: doshfunc (exec.c:4920)
==10206==    by 0x4302FB: execshfunc (exec.c:4557)
==10206==    by 0x42D8C1: execcmd (exec.c:3373)
==10206== 
==10206== 
==10206== 2 errors in context 2 of 2:
==10206== Conditional jump or move depends on uninitialised value(s)
==10206==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10206==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10206==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10206==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10206==    by 0x42D8E9: execcmd (exec.c:3378)
==10206==    by 0x428CA0: execpline2 (exec.c:1697)
==10206==    by 0x427FD2: execpline (exec.c:1484)
==10206==    by 0x42779A: execlist (exec.c:1275)
==10206==    by 0x42717C: execode (exec.c:1073)
==10206==    by 0x431299: runshfunc (exec.c:5040)
==10206==    by 0x430E76: doshfunc (exec.c:4920)
==10206==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10206== 
==10206== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10207== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10207-by-pythonnut-on-???
==10207== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10207-by-pythonnut-on-???
==10207== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10207-by-pythonnut-on-???
==10207== 
==10207== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10207== don't want to do, unless you know exactly what you're doing,
==10207== or are doing some strange experiment):
==10207==   /usr/lib/valgrind/../../bin/vgdb --pid=10207 ...command...
==10207== 
==10207== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10207==   /path/to/gdb ./zsh
==10207== and then give GDB the following command
==10207==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10207
==10207== --pid is optional if only one valgrind process is running
==10207== 
--10255-- Caught __NR_exit; running __libc_freeres()
==10256== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10256-by-pythonnut-on-???
==10256== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10256-by-pythonnut-on-???
==10256== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10256-by-pythonnut-on-???
==10256== 
==10256== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10256== don't want to do, unless you know exactly what you're doing,
==10256== or are doing some strange experiment):
==10256==   /usr/lib/valgrind/../../bin/vgdb --pid=10256 ...command...
==10256== 
==10256== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10256==   /path/to/gdb ./zsh
==10256== and then give GDB the following command
==10256==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10256
==10256== --pid is optional if only one valgrind process is running
==10256== 
--10256-- Caught __NR_exit; running __libc_freeres()
==10255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10255-by-pythonnut-on-???
==10255== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10255-by-pythonnut-on-???
==10255== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10255-by-pythonnut-on-???
==10255== 
==10255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10255== don't want to do, unless you know exactly what you're doing,
==10255== or are doing some strange experiment):
==10255==   /usr/lib/valgrind/../../bin/vgdb --pid=10255 ...command...
==10255== 
==10255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10255==   /path/to/gdb ./zsh
==10255== and then give GDB the following command
==10255==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10255
==10255== --pid is optional if only one valgrind process is running
==10255== 
--10207-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10207== 
==10207== HEAP SUMMARY:
==10207==     in use at exit: 3,114,366 bytes in 68,968 blocks
==10207==   total heap usage: 1,598,092 allocs, 1,529,124 frees, 129,174,023 bytes allocated
==10207== 
--10255-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10255== 
--10256-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10255== HEAP SUMMARY:
==10255==     in use at exit: 3,112,729 bytes in 68,968 blocks
==10255==   total heap usage: 1,598,103 allocs, 1,529,135 frees, 129,063,771 bytes allocated
==10255== 
==10256== 
==10256== HEAP SUMMARY:
==10256==     in use at exit: 3,137,352 bytes in 69,536 blocks
==10256==   total heap usage: 1,595,217 allocs, 1,525,681 frees, 128,946,135 bytes allocated
==10256== 
==10207== Searching for pointers to 68,968 not-freed blocks
--10207--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10207--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10207--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10207--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10207--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10207--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10207--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10207--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10207--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10207--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10207--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10207--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10207--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10207--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10207--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10207--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10207--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10207--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10207--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10207--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10207--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10207--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10207--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10207--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10207--   Scanning root segment: 0x701a000..0x701afff (4096)
--10207--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10207--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10207--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10207--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10207--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10207--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10207--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10207--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10207--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10207--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10255== Searching for pointers to 68,968 not-freed blocks
--10255--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10255--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10255--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10255--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10255--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10255--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10255--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10255--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10255--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10255--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10255--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10255--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10255--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10255--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10255--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10255--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10255--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10255--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10255--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10255--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10255--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10255--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10255--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10255--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10255--   Scanning root segment: 0x701a000..0x701afff (4096)
--10255--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10255--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10255--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10255--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10255--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10255--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10255--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10255--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10255--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10255--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10256== Searching for pointers to 69,536 not-freed blocks
--10256--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10256--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10256--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10256--   Scanning root segment: 0x4037000..0x403efff (32768)
--10256--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10256--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10256--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10256--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10256--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10256--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10256--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10256--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10256--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10256--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10256--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10256--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10256--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10256--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10256--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10256--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10256--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10256--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10256--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10256--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10256--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10256--   Scanning root segment: 0x701a000..0x701afff (4096)
--10256--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10256--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10256--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10256--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10256--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10256--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10256--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10256--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10256--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10256--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10207== Checked 4,775,032 bytes
==10207== 
==10255== Checked 4,788,512 bytes
==10255== 
==10207== LEAK SUMMARY:
==10207==    definitely lost: 2,197 bytes in 13 blocks
==10207==    indirectly lost: 6,756 bytes in 7 blocks
==10207==      possibly lost: 0 bytes in 0 blocks
==10207==    still reachable: 3,105,413 bytes in 68,948 blocks
==10207==         suppressed: 0 bytes in 0 blocks
==10207== Rerun with --leak-check=full to see details of leaked memory
==10207== 
==10207== Use --track-origins=yes to see where uninitialised values come from
==10207== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10207== 
==10207== 1 errors in context 1 of 2:
==10207== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10207==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10207==    by 0x488CD0: stringsubst (subst.c:301)
==10207==    by 0x48801B: prefork (subst.c:77)
==10207==    by 0x42B318: execcmd (exec.c:2619)
==10207==    by 0x428CA0: execpline2 (exec.c:1697)
==10207==    by 0x427FD2: execpline (exec.c:1484)
==10207==    by 0x427756: execlist (exec.c:1267)
==10207==    by 0x42717C: execode (exec.c:1073)
==10207==    by 0x431299: runshfunc (exec.c:5040)
==10207==    by 0x430E76: doshfunc (exec.c:4920)
==10207==    by 0x4302FB: execshfunc (exec.c:4557)
==10207==    by 0x42D8C1: execcmd (exec.c:3373)
==10207== 
==10207== 
==10207== 2 errors in context 2 of 2:
==10207== Conditional jump or move depends on uninitialised value(s)
==10207==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10207==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10207==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10207==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10207==    by 0x42D8E9: execcmd (exec.c:3378)
==10207==    by 0x428CA0: execpline2 (exec.c:1697)
==10207==    by 0x427FD2: execpline (exec.c:1484)
==10207==    by 0x42779A: execlist (exec.c:1275)
==10207==    by 0x42717C: execode (exec.c:1073)
==10207==    by 0x431299: runshfunc (exec.c:5040)
==10207==    by 0x430E76: doshfunc (exec.c:4920)
==10207==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10207== 
==10207== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10200-- Caught __NR_exit; running __libc_freeres()
==10256== Checked 4,839,344 bytes
==10256== 
==10255== LEAK SUMMARY:
==10255==    definitely lost: 2,197 bytes in 13 blocks
==10255==    indirectly lost: 6,756 bytes in 7 blocks
==10255==      possibly lost: 0 bytes in 0 blocks
==10255==    still reachable: 3,103,776 bytes in 68,948 blocks
==10255==         suppressed: 0 bytes in 0 blocks
==10255== Rerun with --leak-check=full to see details of leaked memory
==10255== 
==10255== Use --track-origins=yes to see where uninitialised values come from
==10255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10255== 
==10255== 1 errors in context 1 of 2:
==10255== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10255==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10255==    by 0x488CD0: stringsubst (subst.c:301)
==10255==    by 0x48801B: prefork (subst.c:77)
==10255==    by 0x42B318: execcmd (exec.c:2619)
==10255==    by 0x428CA0: execpline2 (exec.c:1697)
==10255==    by 0x427FD2: execpline (exec.c:1484)
==10255==    by 0x427756: execlist (exec.c:1267)
==10255==    by 0x42717C: execode (exec.c:1073)
==10255==    by 0x431299: runshfunc (exec.c:5040)
==10255==    by 0x430E76: doshfunc (exec.c:4920)
==10255==    by 0x4302FB: execshfunc (exec.c:4557)
==10255==    by 0x42D8C1: execcmd (exec.c:3373)
==10255== 
==10255== 
==10255== 2 errors in context 2 of 2:
==10255== Conditional jump or move depends on uninitialised value(s)
==10255==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10255==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10255==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10255==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10255==    by 0x42D8E9: execcmd (exec.c:3378)
==10255==    by 0x428CA0: execpline2 (exec.c:1697)
==10255==    by 0x427FD2: execpline (exec.c:1484)
==10255==    by 0x42779A: execlist (exec.c:1275)
==10255==    by 0x42717C: execode (exec.c:1073)
==10255==    by 0x431299: runshfunc (exec.c:5040)
==10255==    by 0x430E76: doshfunc (exec.c:4920)
==10255==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10255== 
==10255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10200-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10256== LEAK SUMMARY:
==10256==    definitely lost: 2,221 bytes in 14 blocks
==10256==    indirectly lost: 6,796 bytes in 9 blocks
==10256==      possibly lost: 0 bytes in 0 blocks
==10256==    still reachable: 3,128,335 bytes in 69,513 blocks
==10256==         suppressed: 0 bytes in 0 blocks
==10256== Rerun with --leak-check=full to see details of leaked memory
==10256== 
==10256== Use --track-origins=yes to see where uninitialised values come from
==10256== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10256== 
==10256== 1 errors in context 1 of 2:
==10256== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10256==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10256==    by 0x488CD0: stringsubst (subst.c:301)
==10256==    by 0x48801B: prefork (subst.c:77)
==10256==    by 0x42B318: execcmd (exec.c:2619)
==10256==    by 0x428CA0: execpline2 (exec.c:1697)
==10256==    by 0x427FD2: execpline (exec.c:1484)
==10256==    by 0x427756: execlist (exec.c:1267)
==10256==    by 0x42717C: execode (exec.c:1073)
==10256==    by 0x431299: runshfunc (exec.c:5040)
==10256==    by 0x430E76: doshfunc (exec.c:4920)
==10256==    by 0x4302FB: execshfunc (exec.c:4557)
==10256==    by 0x42D8C1: execcmd (exec.c:3373)
==10256== 
==10256== 
==10256== 2 errors in context 2 of 2:
==10256== Conditional jump or move depends on uninitialised value(s)
==10256==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10256==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10256==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10256==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10256==    by 0x42D8E9: execcmd (exec.c:3378)
==10256==    by 0x428CA0: execpline2 (exec.c:1697)
==10256==    by 0x427FD2: execpline (exec.c:1484)
==10256==    by 0x42779A: execlist (exec.c:1275)
==10256==    by 0x42717C: execode (exec.c:1073)
==10256==    by 0x431299: runshfunc (exec.c:5040)
==10256==    by 0x430E76: doshfunc (exec.c:4920)
==10256==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10256== 
==10256== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10200== 
--10257-- Caught __NR_exit; running __libc_freeres()
==10200== HEAP SUMMARY:
==10200==     in use at exit: 3,113,504 bytes in 68,949 blocks
==10200==   total heap usage: 1,598,101 allocs, 1,529,152 frees, 129,176,026 bytes allocated
==10200== 
==10258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10258-by-pythonnut-on-???
==10258== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10258-by-pythonnut-on-???
==10258== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10258-by-pythonnut-on-???
==10258== 
==10258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10258== don't want to do, unless you know exactly what you're doing,
==10258== or are doing some strange experiment):
==10258==   /usr/lib/valgrind/../../bin/vgdb --pid=10258 ...command...
==10258== 
==10258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10258==   /path/to/gdb ./zsh
==10258== and then give GDB the following command
==10258==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10258
==10258== --pid is optional if only one valgrind process is running
==10258== 
==10257== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10257-by-pythonnut-on-???
==10257== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10257-by-pythonnut-on-???
==10257== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10257-by-pythonnut-on-???
==10257== 
==10257== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10257== don't want to do, unless you know exactly what you're doing,
==10257== or are doing some strange experiment):
==10257==   /usr/lib/valgrind/../../bin/vgdb --pid=10257 ...command...
==10257== 
==10257== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10257==   /path/to/gdb ./zsh
==10257== and then give GDB the following command
==10257==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10257
==10257== --pid is optional if only one valgrind process is running
==10257== 
--10258-- Caught __NR_exit; running __libc_freeres()
--10257-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10200== Searching for pointers to 68,949 not-freed blocks
--10200--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10200--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10200--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10200--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10200--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10200--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10200--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10200--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10200--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10200--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10200--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10200--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10200--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10200--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10200--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10200--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10200--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10200--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10200--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10200--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10200--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10200--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10200--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10200--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10200--   Scanning root segment: 0x701a000..0x701afff (4096)
--10200--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10200--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10200--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10200--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10200--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10200--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==10257== 
--10200--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10200--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10200--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10200--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10257== HEAP SUMMARY:
==10257==     in use at exit: 3,112,889 bytes in 68,969 blocks
==10257==   total heap usage: 1,598,120 allocs, 1,529,151 frees, 129,068,622 bytes allocated
==10257== 
--10258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10258== 
==10258== HEAP SUMMARY:
==10258==     in use at exit: 3,137,351 bytes in 69,536 blocks
==10258==   total heap usage: 1,595,225 allocs, 1,525,689 frees, 128,949,788 bytes allocated
==10258== 
==10257== Searching for pointers to 68,969 not-freed blocks
--10257--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10257--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10257--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10257--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10257--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10257--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10257--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10257--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10257--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10257--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10257--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10257--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10257--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10257--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10257--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10257--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10257--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10257--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10257--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10257--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10257--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10257--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10257--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10257--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10257--   Scanning root segment: 0x701a000..0x701afff (4096)
--10257--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10257--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10257--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10257--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10257--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10257--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10257--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10257--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10257--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10257--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10258== Searching for pointers to 69,536 not-freed blocks
--10258--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10258--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10258--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10258--   Scanning root segment: 0x4037000..0x403efff (32768)
--10258--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10258--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10258--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10258--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10258--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10258--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10258--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10258--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10258--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10258--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10258--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10258--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10258--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10258--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10258--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10258--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10258--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10258--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10258--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10258--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10258--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10258--   Scanning root segment: 0x701a000..0x701afff (4096)
--10258--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10258--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10258--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10258--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10258--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10258--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10258--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10258--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10258--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10258--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10200== Checked 4,772,416 bytes
==10200== 
==10200== LEAK SUMMARY:
==10200==    definitely lost: 2,197 bytes in 13 blocks
==10200==    indirectly lost: 6,756 bytes in 7 blocks
==10200==      possibly lost: 0 bytes in 0 blocks
==10200==    still reachable: 3,104,551 bytes in 68,929 blocks
==10200==         suppressed: 0 bytes in 0 blocks
==10200== Rerun with --leak-check=full to see details of leaked memory
==10200== 
==10200== Use --track-origins=yes to see where uninitialised values come from
==10200== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10200== 
==10200== 1 errors in context 1 of 2:
==10200== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10200==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10200==    by 0x488CD0: stringsubst (subst.c:301)
==10200==    by 0x48801B: prefork (subst.c:77)
==10200==    by 0x42B318: execcmd (exec.c:2619)
==10200==    by 0x428CA0: execpline2 (exec.c:1697)
==10200==    by 0x427FD2: execpline (exec.c:1484)
==10200==    by 0x427756: execlist (exec.c:1267)
==10200==    by 0x42717C: execode (exec.c:1073)
==10200==    by 0x431299: runshfunc (exec.c:5040)
==10200==    by 0x430E76: doshfunc (exec.c:4920)
==10200==    by 0x4302FB: execshfunc (exec.c:4557)
==10200==    by 0x42D8C1: execcmd (exec.c:3373)
==10200== 
==10200== 
==10200== 2 errors in context 2 of 2:
==10200== Conditional jump or move depends on uninitialised value(s)
==10200==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10200==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10200==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10200==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10200==    by 0x42D8E9: execcmd (exec.c:3378)
==10200==    by 0x428CA0: execpline2 (exec.c:1697)
==10200==    by 0x427FD2: execpline (exec.c:1484)
==10200==    by 0x42779A: execlist (exec.c:1275)
==10200==    by 0x42717C: execode (exec.c:1073)
==10200==    by 0x431299: runshfunc (exec.c:5040)
==10200==    by 0x430E76: doshfunc (exec.c:4920)
==10200==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10200== 
==10200== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10257== Checked 4,787,856 bytes
==10257== 
==10257== LEAK SUMMARY:
==10257==    definitely lost: 2,197 bytes in 13 blocks
==10257==    indirectly lost: 6,756 bytes in 7 blocks
==10257==      possibly lost: 0 bytes in 0 blocks
==10257==    still reachable: 3,103,936 bytes in 68,949 blocks
==10257==         suppressed: 0 bytes in 0 blocks
==10257== Rerun with --leak-check=full to see details of leaked memory
==10257== 
==10257== Use --track-origins=yes to see where uninitialised values come from
==10257== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10257== 
==10257== 1 errors in context 1 of 2:
==10257== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10257==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10257==    by 0x488CD0: stringsubst (subst.c:301)
==10257==    by 0x48801B: prefork (subst.c:77)
==10257==    by 0x42B318: execcmd (exec.c:2619)
==10257==    by 0x428CA0: execpline2 (exec.c:1697)
==10257==    by 0x427FD2: execpline (exec.c:1484)
==10257==    by 0x427756: execlist (exec.c:1267)
==10257==    by 0x42717C: execode (exec.c:1073)
==10257==    by 0x431299: runshfunc (exec.c:5040)
==10257==    by 0x430E76: doshfunc (exec.c:4920)
==10257==    by 0x4302FB: execshfunc (exec.c:4557)
==10257==    by 0x42D8C1: execcmd (exec.c:3373)
==10257== 
==10257== 
==10257== 2 errors in context 2 of 2:
==10257== Conditional jump or move depends on uninitialised value(s)
==10257==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10257==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10257==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10257==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10257==    by 0x42D8E9: execcmd (exec.c:3378)
==10258== Checked 4,839,344 bytes
==10257==    by 0x428CA0: execpline2 (exec.c:1697)
==10258== 
==10257==    by 0x427FD2: execpline (exec.c:1484)
==10257==    by 0x42779A: execlist (exec.c:1275)
==10257==    by 0x42717C: execode (exec.c:1073)
==10257==    by 0x431299: runshfunc (exec.c:5040)
==10257==    by 0x430E76: doshfunc (exec.c:4920)
==10257==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10257== 
==10257== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10260-- Caught __NR_exit; running __libc_freeres()
==10260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10260-by-pythonnut-on-???
==10260== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10260-by-pythonnut-on-???
==10260== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10260-by-pythonnut-on-???
==10260== 
==10260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10260== don't want to do, unless you know exactly what you're doing,
==10260== or are doing some strange experiment):
==10260==   /usr/lib/valgrind/../../bin/vgdb --pid=10260 ...command...
==10260== 
==10260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10260==   /path/to/gdb ./zsh
==10260== and then give GDB the following command
==10260==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10260
==10260== --pid is optional if only one valgrind process is running
==10260== 
==10258== LEAK SUMMARY:
==10258==    definitely lost: 2,221 bytes in 14 blocks
==10258==    indirectly lost: 6,796 bytes in 9 blocks
==10258==      possibly lost: 0 bytes in 0 blocks
==10258==    still reachable: 3,128,334 bytes in 69,513 blocks
==10258==         suppressed: 0 bytes in 0 blocks
==10258== Rerun with --leak-check=full to see details of leaked memory
==10258== 
==10258== Use --track-origins=yes to see where uninitialised values come from
==10258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10258== 
==10258== 1 errors in context 1 of 2:
==10258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10258==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10258==    by 0x488CD0: stringsubst (subst.c:301)
==10258==    by 0x48801B: prefork (subst.c:77)
==10258==    by 0x42B318: execcmd (exec.c:2619)
==10258==    by 0x428CA0: execpline2 (exec.c:1697)
==10258==    by 0x427FD2: execpline (exec.c:1484)
==10258==    by 0x427756: execlist (exec.c:1267)
==10258==    by 0x42717C: execode (exec.c:1073)
==10258==    by 0x431299: runshfunc (exec.c:5040)
==10258==    by 0x430E76: doshfunc (exec.c:4920)
==10258==    by 0x4302FB: execshfunc (exec.c:4557)
==10258==    by 0x42D8C1: execcmd (exec.c:3373)
==10258== 
==10258== 
==10258== 2 errors in context 2 of 2:
==10258== Conditional jump or move depends on uninitialised value(s)
==10258==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10258==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10258==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10258==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10258==    by 0x42D8E9: execcmd (exec.c:3378)
==10258==    by 0x428CA0: execpline2 (exec.c:1697)
==10258==    by 0x427FD2: execpline (exec.c:1484)
==10258==    by 0x42779A: execlist (exec.c:1275)
==10258==    by 0x42717C: execode (exec.c:1073)
==10258==    by 0x431299: runshfunc (exec.c:5040)
==10258==    by 0x430E76: doshfunc (exec.c:4920)
==10258==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10258== 
==10258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10261-by-pythonnut-on-???
==10261== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10261-by-pythonnut-on-???
==10261== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10261-by-pythonnut-on-???
==10261== 
==10261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10261== don't want to do, unless you know exactly what you're doing,
==10261== or are doing some strange experiment):
==10261==   /usr/lib/valgrind/../../bin/vgdb --pid=10261 ...command...
==10261== 
==10261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10261==   /path/to/gdb ./zsh
==10261== and then give GDB the following command
==10261==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10261
==10261== --pid is optional if only one valgrind process is running
==10261== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--10260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10263-by-pythonnut-on-???
==10263== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10263-by-pythonnut-on-???
==10263== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10263-by-pythonnut-on-???
==10263== 
==10263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10263== don't want to do, unless you know exactly what you're doing,
==10263== or are doing some strange experiment):
==10263==   /usr/lib/valgrind/../../bin/vgdb --pid=10263 ...command...
==10263== 
==10263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10263==   /path/to/gdb ./zsh
==10263== and then give GDB the following command
==10263==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10263
==10263== --pid is optional if only one valgrind process is running
==10263== 
--10261-- Caught __NR_exit; running __libc_freeres()
==10260== 
==10260== HEAP SUMMARY:
==10260==     in use at exit: 3,115,245 bytes in 69,011 blocks
==10260==   total heap usage: 1,598,167 allocs, 1,529,156 frees, 129,184,603 bytes allocated
==10260== 
--10263-- Caught __NR_exit; running __libc_freeres()
--10261-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10260== Searching for pointers to 69,011 not-freed blocks
--10260--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10260--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10260--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10260--   Scanning root segment: 0x4037000..0x403afff (16384)
--10260--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10260--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10260--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10260--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10260--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10260--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10260--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10260--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10260--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10260--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10260--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10260--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10260--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10260--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10260--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10260--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10260--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10260--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10260--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10260--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10260--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10260--   Scanning root segment: 0x701a000..0x701afff (4096)
--10260--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10260--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10260--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10260--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10260--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10260--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10260--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10260--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10260--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10260--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10261== 
--10263-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10261== HEAP SUMMARY:
==10261==     in use at exit: 3,113,095 bytes in 68,974 blocks
==10261==   total heap usage: 1,598,167 allocs, 1,529,193 frees, 129,077,574 bytes allocated
==10261== 
==10263== 
==10263== HEAP SUMMARY:
==10263==     in use at exit: 3,137,354 bytes in 69,536 blocks
==10263==   total heap usage: 1,595,227 allocs, 1,525,691 frees, 128,950,365 bytes allocated
==10263== 
==10261== Searching for pointers to 68,974 not-freed blocks
--10261--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10261--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10261--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10261--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10261--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10261--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10261--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10261--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10261--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10261--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10261--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10261--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10261--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10261--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10261--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10261--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10261--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10261--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10261--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10261--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10261--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10261--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10261--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==10263== Searching for pointers to 69,536 not-freed blocks
--10261--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10263--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10261--   Scanning root segment: 0x701a000..0x701afff (4096)
--10261--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10261--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10261--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10263--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10261--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10261--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10261--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10261--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10261--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10261--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10261--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10263--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10263--   Scanning root segment: 0x4037000..0x403efff (32768)
--10263--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10263--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10263--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10263--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10263--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10263--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10263--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10263--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10263--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10263--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10263--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10263--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10263--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10263--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10263--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10263--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10263--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10263--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10263--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10263--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10263--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10263--   Scanning root segment: 0x701a000..0x701afff (4096)
--10263--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10263--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10263--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10263--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10263--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10263--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10263--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10263--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10263--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10263--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10260== Checked 4,791,024 bytes
==10260== 
==10260== LEAK SUMMARY:
==10260==    definitely lost: 2,197 bytes in 13 blocks
==10260==    indirectly lost: 6,756 bytes in 7 blocks
==10260==      possibly lost: 0 bytes in 0 blocks
==10260==    still reachable: 3,106,292 bytes in 68,991 blocks
==10260==         suppressed: 0 bytes in 0 blocks
==10260== Rerun with --leak-check=full to see details of leaked memory
==10260== 
==10260== Use --track-origins=yes to see where uninitialised values come from
==10260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10260== 
==10260== 1 errors in context 1 of 2:
==10260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10260==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10260==    by 0x488CD0: stringsubst (subst.c:301)
==10260==    by 0x48801B: prefork (subst.c:77)
==10260==    by 0x42B318: execcmd (exec.c:2619)
==10260==    by 0x428CA0: execpline2 (exec.c:1697)
==10260==    by 0x427FD2: execpline (exec.c:1484)
==10260==    by 0x427756: execlist (exec.c:1267)
==10260==    by 0x42717C: execode (exec.c:1073)
==10260==    by 0x431299: runshfunc (exec.c:5040)
==10260==    by 0x430E76: doshfunc (exec.c:4920)
==10260==    by 0x4302FB: execshfunc (exec.c:4557)
==10260==    by 0x42D8C1: execcmd (exec.c:3373)
==10260== 
==10260== 
==10260== 2 errors in context 2 of 2:
==10260== Conditional jump or move depends on uninitialised value(s)
==10260==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10260==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10260==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10260==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10260==    by 0x42D8E9: execcmd (exec.c:3378)
==10260==    by 0x428CA0: execpline2 (exec.c:1697)
==10260==    by 0x427FD2: execpline (exec.c:1484)
==10260==    by 0x42779A: execlist (exec.c:1275)
==10260==    by 0x42717C: execode (exec.c:1073)
==10260==    by 0x431299: runshfunc (exec.c:5040)
==10260==    by 0x430E76: doshfunc (exec.c:4920)
==10260==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10260== 
==10260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10259-- Caught __NR_exit; running __libc_freeres()
==10261== Checked 4,788,000 bytes
==10261== 
==10263== Checked 4,839,344 bytes
==10263== 
==10259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10259-by-pythonnut-on-???
==10259== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10259-by-pythonnut-on-???
==10259== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10259-by-pythonnut-on-???
==10259== 
==10259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10259== don't want to do, unless you know exactly what you're doing,
==10259== or are doing some strange experiment):
==10259==   /usr/lib/valgrind/../../bin/vgdb --pid=10259 ...command...
==10259== 
==10259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10259==   /path/to/gdb ./zsh
==10259== and then give GDB the following command
==10259==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10259
==10259== --pid is optional if only one valgrind process is running
==10259== 
==10261== LEAK SUMMARY:
==10261==    definitely lost: 2,197 bytes in 13 blocks
==10261==    indirectly lost: 6,756 bytes in 7 blocks
==10261==      possibly lost: 0 bytes in 0 blocks
==10261==    still reachable: 3,104,142 bytes in 68,954 blocks
==10261==         suppressed: 0 bytes in 0 blocks
==10261== Rerun with --leak-check=full to see details of leaked memory
==10261== 
==10261== Use --track-origins=yes to see where uninitialised values come from
==10261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10261== 
==10261== 1 errors in context 1 of 2:
==10261== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10261==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10261==    by 0x488CD0: stringsubst (subst.c:301)
==10261==    by 0x48801B: prefork (subst.c:77)
==10261==    by 0x42B318: execcmd (exec.c:2619)
==10261==    by 0x428CA0: execpline2 (exec.c:1697)
==10261==    by 0x427FD2: execpline (exec.c:1484)
==10261==    by 0x427756: execlist (exec.c:1267)
==10261==    by 0x42717C: execode (exec.c:1073)
==10261==    by 0x431299: runshfunc (exec.c:5040)
==10261==    by 0x430E76: doshfunc (exec.c:4920)
==10261==    by 0x4302FB: execshfunc (exec.c:4557)
==10261==    by 0x42D8C1: execcmd (exec.c:3373)
==10261== 
==10261== 
==10261== 2 errors in context 2 of 2:
==10261== Conditional jump or move depends on uninitialised value(s)
==10261==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10261==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10261==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10261==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10261==    by 0x42D8E9: execcmd (exec.c:3378)
==10261==    by 0x428CA0: execpline2 (exec.c:1697)
==10261==    by 0x427FD2: execpline (exec.c:1484)
==10261==    by 0x42779A: execlist (exec.c:1275)
==10261==    by 0x42717C: execode (exec.c:1073)
==10261==    by 0x431299: runshfunc (exec.c:5040)
==10261==    by 0x430E76: doshfunc (exec.c:4920)
==10261==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10261== 
==10261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10263== LEAK SUMMARY:
==10263==    definitely lost: 2,221 bytes in 14 blocks
==10263==    indirectly lost: 6,796 bytes in 9 blocks
==10263==      possibly lost: 0 bytes in 0 blocks
==10263==    still reachable: 3,128,337 bytes in 69,513 blocks
==10263==         suppressed: 0 bytes in 0 blocks
==10263== Rerun with --leak-check=full to see details of leaked memory
==10263== 
==10263== Use --track-origins=yes to see where uninitialised values come from
==10263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10263== 
==10263== 1 errors in context 1 of 2:
==10263== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10263==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10263==    by 0x488CD0: stringsubst (subst.c:301)
==10263==    by 0x48801B: prefork (subst.c:77)
==10263==    by 0x42B318: execcmd (exec.c:2619)
==10263==    by 0x428CA0: execpline2 (exec.c:1697)
==10263==    by 0x427FD2: execpline (exec.c:1484)
==10263==    by 0x427756: execlist (exec.c:1267)
==10263==    by 0x42717C: execode (exec.c:1073)
==10263==    by 0x431299: runshfunc (exec.c:5040)
==10263==    by 0x430E76: doshfunc (exec.c:4920)
==10263==    by 0x4302FB: execshfunc (exec.c:4557)
==10263==    by 0x42D8C1: execcmd (exec.c:3373)
==10263== 
==10263== 
==10263== 2 errors in context 2 of 2:
==10263== Conditional jump or move depends on uninitialised value(s)
==10263==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10263==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10263==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10263==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10263==    by 0x42D8E9: execcmd (exec.c:3378)
==10263==    by 0x428CA0: execpline2 (exec.c:1697)
==10263==    by 0x427FD2: execpline (exec.c:1484)
==10263==    by 0x42779A: execlist (exec.c:1275)
==10263==    by 0x42717C: execode (exec.c:1073)
==10263==    by 0x431299: runshfunc (exec.c:5040)
==10263==    by 0x430E76: doshfunc (exec.c:4920)
==10263==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10263== 
==10263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10259-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10259== 
==10259== HEAP SUMMARY:
==10259==     in use at exit: 3,115,181 bytes in 69,008 blocks
==10259==   total heap usage: 1,598,169 allocs, 1,529,161 frees, 129,185,147 bytes allocated
==10259== 
==10267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10267-by-pythonnut-on-???
==10267== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10267-by-pythonnut-on-???
==10267== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10267-by-pythonnut-on-???
==10267== 
==10267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10267== don't want to do, unless you know exactly what you're doing,
==10267== or are doing some strange experiment):
==10267==   /usr/lib/valgrind/../../bin/vgdb --pid=10267 ...command...
==10267== 
==10267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10267==   /path/to/gdb ./zsh
==10267== and then give GDB the following command
==10267==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10267
==10267== --pid is optional if only one valgrind process is running
==10267== 
--10268-- Caught __NR_exit; running __libc_freeres()
--10266-- Caught __NR_exit; running __libc_freeres()
==10266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10266-by-pythonnut-on-???
==10266== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10266-by-pythonnut-on-???
==10266== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10266-by-pythonnut-on-???
==10266== 
==10266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10266== don't want to do, unless you know exactly what you're doing,
==10266== or are doing some strange experiment):
==10266==   /usr/lib/valgrind/../../bin/vgdb --pid=10266 ...command...
==10266== 
==10266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10266==   /path/to/gdb ./zsh
==10266== and then give GDB the following command
==10266==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10266
==10266== --pid is optional if only one valgrind process is running
==10266== 
==10268== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10268-by-pythonnut-on-???
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
==10268== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10268-by-pythonnut-on-???
==10268== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10268-by-pythonnut-on-???
==10268== 
==10268== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10268== don't want to do, unless you know exactly what you're doing,
==10268== or are doing some strange experiment):
==10268==   /usr/lib/valgrind/../../bin/vgdb --pid=10268 ...command...
==10268== 
==10268== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10268==   /path/to/gdb ./zsh
==10268== and then give GDB the following command
==10268==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10268
==10268== --pid is optional if only one valgrind process is running
==10268== 
==10259== Searching for pointers to 69,008 not-freed blocks
--10259--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10259--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10259--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10259--   Scanning root segment: 0x4037000..0x403afff (16384)
--10259--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10259--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10259--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10259--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10259--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10259--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10259--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10259--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10259--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10259--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10259--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10259--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10259--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10259--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10259--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10259--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10259--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10259--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10259--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10259--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10259--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10259--   Scanning root segment: 0x701a000..0x701afff (4096)
--10259--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10259--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10259--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10259--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10259--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10259--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10259--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10259--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10259--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10259--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10268-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10266== 
==10266== HEAP SUMMARY:
==10266==     in use at exit: 3,112,999 bytes in 68,974 blocks
==10266==   total heap usage: 1,598,147 allocs, 1,529,173 frees, 129,075,344 bytes allocated
==10266== 
==10268== 
==10268== HEAP SUMMARY:
==10268==     in use at exit: 3,137,636 bytes in 69,541 blocks
==10268==   total heap usage: 1,595,232 allocs, 1,525,691 frees, 128,953,955 bytes allocated
==10268== 
==10266== Searching for pointers to 68,974 not-freed blocks
--10266--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10266--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10266--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10266--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10266--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10266--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10266--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10266--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10266--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10266--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10266--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10266--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10266--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10266--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10266--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10266--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10266--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10266--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10266--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10266--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10266--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10266--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10266--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10266--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10266--   Scanning root segment: 0x701a000..0x701afff (4096)
--10266--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10266--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10266--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10266--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10266--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10266--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10266--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10266--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10266--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10266--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10268== Searching for pointers to 69,541 not-freed blocks
--10268--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10268--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10268--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10268--   Scanning root segment: 0x4037000..0x403efff (32768)
--10268--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10268--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10268--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10268--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10268--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10268--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10268--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10268--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10268--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10268--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10268--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10268--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10268--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10268--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10268--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10268--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10268--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10268--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10268--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10268--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10268--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10268--   Scanning root segment: 0x701a000..0x701afff (4096)
--10268--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10268--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10268--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10268--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10268--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10268--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10268--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10268--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10268--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10268--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10259== Checked 4,790,336 bytes
==10259== 
==10259== LEAK SUMMARY:
==10259==    definitely lost: 2,197 bytes in 13 blocks
==10259==    indirectly lost: 6,756 bytes in 7 blocks
==10259==      possibly lost: 0 bytes in 0 blocks
==10259==    still reachable: 3,106,228 bytes in 68,988 blocks
==10259==         suppressed: 0 bytes in 0 blocks
==10259== Rerun with --leak-check=full to see details of leaked memory
==10259== 
==10259== Use --track-origins=yes to see where uninitialised values come from
==10259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10259== 
==10259== 1 errors in context 1 of 2:
==10259== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10259==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10259==    by 0x488CD0: stringsubst (subst.c:301)
==10259==    by 0x48801B: prefork (subst.c:77)
==10259==    by 0x42B318: execcmd (exec.c:2619)
==10259==    by 0x428CA0: execpline2 (exec.c:1697)
==10259==    by 0x427FD2: execpline (exec.c:1484)
==10259==    by 0x427756: execlist (exec.c:1267)
==10259==    by 0x42717C: execode (exec.c:1073)
==10259==    by 0x431299: runshfunc (exec.c:5040)
==10259==    by 0x430E76: doshfunc (exec.c:4920)
==10259==    by 0x4302FB: execshfunc (exec.c:4557)
==10259==    by 0x42D8C1: execcmd (exec.c:3373)
==10259== 
==10259== 
==10259== 2 errors in context 2 of 2:
==10259== Conditional jump or move depends on uninitialised value(s)
==10259==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10259==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10259==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10259==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10259==    by 0x42D8E9: execcmd (exec.c:3378)
==10259==    by 0x428CA0: execpline2 (exec.c:1697)
==10259==    by 0x427FD2: execpline (exec.c:1484)
==10259==    by 0x42779A: execlist (exec.c:1275)
==10259==    by 0x42717C: execode (exec.c:1073)
==10259==    by 0x431299: runshfunc (exec.c:5040)
==10259==    by 0x430E76: doshfunc (exec.c:4920)
==10259==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10259== 
==10259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10270-by-pythonnut-on-???
==10270== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10270-by-pythonnut-on-???
==10270== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10270-by-pythonnut-on-???
==10270== 
==10270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10270== don't want to do, unless you know exactly what you're doing,
==10270== or are doing some strange experiment):
==10270==   /usr/lib/valgrind/../../bin/vgdb --pid=10270 ...command...
==10270== 
==10270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10270==   /path/to/gdb ./zsh
==10270== and then give GDB the following command
==10270==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10270
==10270== --pid is optional if only one valgrind process is running
==10270== 
--10270-- Caught __NR_exit; running __libc_freeres()
==10266== Checked 4,766,904 bytes
==10266== 
--10270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10266== LEAK SUMMARY:
==10266==    definitely lost: 2,197 bytes in 13 blocks
==10266==    indirectly lost: 6,756 bytes in 7 blocks
==10266==      possibly lost: 0 bytes in 0 blocks
==10266==    still reachable: 3,104,046 bytes in 68,954 blocks
==10266==         suppressed: 0 bytes in 0 blocks
==10266== Rerun with --leak-check=full to see details of leaked memory
==10266== 
==10266== Use --track-origins=yes to see where uninitialised values come from
==10266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10266== 
==10266== 1 errors in context 1 of 2:
==10266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10266==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10266==    by 0x488CD0: stringsubst (subst.c:301)
==10266==    by 0x48801B: prefork (subst.c:77)
==10266==    by 0x42B318: execcmd (exec.c:2619)
==10266==    by 0x428CA0: execpline2 (exec.c:1697)
==10266==    by 0x427FD2: execpline (exec.c:1484)
==10266==    by 0x427756: execlist (exec.c:1267)
==10266==    by 0x42717C: execode (exec.c:1073)
==10266==    by 0x431299: runshfunc (exec.c:5040)
==10266==    by 0x430E76: doshfunc (exec.c:4920)
==10266==    by 0x4302FB: execshfunc (exec.c:4557)
==10266==    by 0x42D8C1: execcmd (exec.c:3373)
==10266== 
==10266== 
==10266== 2 errors in context 2 of 2:
==10266== Conditional jump or move depends on uninitialised value(s)
==10266==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10266==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10266==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10266==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10266==    by 0x42D8E9: execcmd (exec.c:3378)
==10266==    by 0x428CA0: execpline2 (exec.c:1697)
==10266==    by 0x427FD2: execpline (exec.c:1484)
==10266==    by 0x42779A: execlist (exec.c:1275)
==10266==    by 0x42717C: execode (exec.c:1073)
==10266==    by 0x431299: runshfunc (exec.c:5040)
==10266==    by 0x430E76: doshfunc (exec.c:4920)
==10266==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10266== 
==10266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10268== Checked 4,840,240 bytes
==10268== 
==10270== 
==10270== HEAP SUMMARY:
==10270==     in use at exit: 3,115,185 bytes in 69,008 blocks
==10270==   total heap usage: 1,598,185 allocs, 1,529,177 frees, 129,190,143 bytes allocated
==10270== 
==10268== LEAK SUMMARY:
==10268==    definitely lost: 2,221 bytes in 14 blocks
==10268==    indirectly lost: 6,796 bytes in 9 blocks
==10268==      possibly lost: 0 bytes in 0 blocks
==10268==    still reachable: 3,128,619 bytes in 69,518 blocks
==10268==         suppressed: 0 bytes in 0 blocks
==10268== Rerun with --leak-check=full to see details of leaked memory
==10268== 
==10268== Use --track-origins=yes to see where uninitialised values come from
==10268== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10268== 
==10268== 1 errors in context 1 of 2:
==10268== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10268==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10268==    by 0x488CD0: stringsubst (subst.c:301)
==10268==    by 0x48801B: prefork (subst.c:77)
==10268==    by 0x42B318: execcmd (exec.c:2619)
==10268==    by 0x428CA0: execpline2 (exec.c:1697)
==10268==    by 0x427FD2: execpline (exec.c:1484)
==10268==    by 0x427756: execlist (exec.c:1267)
==10268==    by 0x42717C: execode (exec.c:1073)
==10268==    by 0x431299: runshfunc (exec.c:5040)
==10268==    by 0x430E76: doshfunc (exec.c:4920)
==10268==    by 0x4302FB: execshfunc (exec.c:4557)
==10268==    by 0x42D8C1: execcmd (exec.c:3373)
==10268== 
==10268== 
==10268== 2 errors in context 2 of 2:
==10268== Conditional jump or move depends on uninitialised value(s)
==10268==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10268==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10268==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10268==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10268==    by 0x42D8E9: execcmd (exec.c:3378)
==10268==    by 0x428CA0: execpline2 (exec.c:1697)
==10268==    by 0x427FD2: execpline (exec.c:1484)
==10268==    by 0x42779A: execlist (exec.c:1275)
==10268==    by 0x42717C: execode (exec.c:1073)
==10268==    by 0x431299: runshfunc (exec.c:5040)
==10268==    by 0x430E76: doshfunc (exec.c:4920)
==10268==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10268== 
==10268== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10267-- Caught __NR_exit; running __libc_freeres()
==10271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10271-by-pythonnut-on-???
==10271== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10271-by-pythonnut-on-???
==10271== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10271-by-pythonnut-on-???
==10271== 
==10271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10271== don't want to do, unless you know exactly what you're doing,
==10271== or are doing some strange experiment):
==10271==   /usr/lib/valgrind/../../bin/vgdb --pid=10271 ...command...
==10271== 
==10271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10271==   /path/to/gdb ./zsh
==10271== and then give GDB the following command
==10271==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10271
==10271== --pid is optional if only one valgrind process is running
==10271== 
==10270== Searching for pointers to 69,008 not-freed blocks
--10270--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10270--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10270--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10270--   Scanning root segment: 0x4037000..0x403afff (16384)
--10270--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10270--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10270--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10270--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10270--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10270--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10270--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10270--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10270--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10270--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10270--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10270--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10270--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10270--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10270--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10270--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10270--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10270--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10270--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10270--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10270--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10270--   Scanning root segment: 0x701a000..0x701afff (4096)
--10270--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10270--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10270--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10270--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10270--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10270--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10270--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10270--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10270--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10270--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10271-- Caught __NR_exit; running __libc_freeres()
--10267-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10267== 
==10267== HEAP SUMMARY:
==10267==     in use at exit: 3,137,412 bytes in 69,538 blocks
==10267==   total heap usage: 1,595,235 allocs, 1,525,697 frees, 128,954,531 bytes allocated
==10267== 
--10271-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10271== 
==10271== HEAP SUMMARY:
==10271==     in use at exit: 3,113,027 bytes in 68,975 blocks
==10271==   total heap usage: 1,598,160 allocs, 1,529,185 frees, 129,078,031 bytes allocated
==10271== 
==10267== Searching for pointers to 69,538 not-freed blocks
--10267--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10267--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10267--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10267--   Scanning root segment: 0x4037000..0x403efff (32768)
--10267--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10267--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10267--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10267--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10267--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10267--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10267--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10267--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10267--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10267--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10267--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10267--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10267--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10267--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10267--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10267--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10267--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10267--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10267--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10267--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10267--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10267--   Scanning root segment: 0x701a000..0x701afff (4096)
--10267--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10267--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10267--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10267--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10267--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10267--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10267--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10267--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10267--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10267--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10271== Searching for pointers to 68,975 not-freed blocks
--10271--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10271--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10271--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10271--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10271--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10271--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10271--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10271--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10271--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10271--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10271--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10271--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10271--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10271--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10271--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10271--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10271--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10271--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10271--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10271--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10271--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10271--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10271--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10271--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10271--   Scanning root segment: 0x701a000..0x701afff (4096)
--10271--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10271--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10271--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10271--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10271--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10271--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10271--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10271--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10271--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10271--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10270== Checked 4,790,344 bytes
==10270== 
==10270== LEAK SUMMARY:
==10270==    definitely lost: 2,197 bytes in 13 blocks
==10270==    indirectly lost: 6,756 bytes in 7 blocks
==10270==      possibly lost: 0 bytes in 0 blocks
==10270==    still reachable: 3,106,232 bytes in 68,988 blocks
==10270==         suppressed: 0 bytes in 0 blocks
==10270== Rerun with --leak-check=full to see details of leaked memory
==10270== 
==10270== Use --track-origins=yes to see where uninitialised values come from
==10270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10270== 
==10270== 1 errors in context 1 of 2:
==10270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10270==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10270==    by 0x488CD0: stringsubst (subst.c:301)
==10270==    by 0x48801B: prefork (subst.c:77)
==10270==    by 0x42B318: execcmd (exec.c:2619)
==10270==    by 0x428CA0: execpline2 (exec.c:1697)
==10270==    by 0x427FD2: execpline (exec.c:1484)
==10270==    by 0x427756: execlist (exec.c:1267)
==10270==    by 0x42717C: execode (exec.c:1073)
==10270==    by 0x431299: runshfunc (exec.c:5040)
==10270==    by 0x430E76: doshfunc (exec.c:4920)
==10270==    by 0x4302FB: execshfunc (exec.c:4557)
==10270==    by 0x42D8C1: execcmd (exec.c:3373)
==10270== 
==10270== 
==10270== 2 errors in context 2 of 2:
==10270== Conditional jump or move depends on uninitialised value(s)
==10270==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10270==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10270==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10270==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10270==    by 0x42D8E9: execcmd (exec.c:3378)
==10270==    by 0x428CA0: execpline2 (exec.c:1697)
==10270==    by 0x427FD2: execpline (exec.c:1484)
==10270==    by 0x42779A: execlist (exec.c:1275)
==10270==    by 0x42717C: execode (exec.c:1073)
==10270==    by 0x431299: runshfunc (exec.c:5040)
==10270==    by 0x430E76: doshfunc (exec.c:4920)
==10270==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10270== 
==10270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10272-by-pythonnut-on-???
==10272== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10272-by-pythonnut-on-???
==10272== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10272-by-pythonnut-on-???
==10272== 
==10272== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10272== don't want to do, unless you know exactly what you're doing,
==10272== or are doing some strange experiment):
==10272==   /usr/lib/valgrind/../../bin/vgdb --pid=10272 ...command...
==10272== 
==10272== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10272==   /path/to/gdb ./zsh
==10272== and then give GDB the following command
==10272==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10272
==10272== --pid is optional if only one valgrind process is running
==10272== 
--10272-- Caught __NR_exit; running __libc_freeres()
==10267== Checked 4,839,384 bytes
==10267== 
--10272-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10271== Checked 4,766,424 bytes
==10271== 
==10267== LEAK SUMMARY:
==10272== 
==10267==    definitely lost: 2,221 bytes in 14 blocks
==10267==    indirectly lost: 6,796 bytes in 9 blocks
==10267==      possibly lost: 0 bytes in 0 blocks
==10267==    still reachable: 3,128,395 bytes in 69,515 blocks
==10267==         suppressed: 0 bytes in 0 blocks
==10267== Rerun with --leak-check=full to see details of leaked memory
==10267== 
==10267== Use --track-origins=yes to see where uninitialised values come from
==10267== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10267== 
==10267== 1 errors in context 1 of 2:
==10267== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10267==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10267==    by 0x488CD0: stringsubst (subst.c:301)
==10267==    by 0x48801B: prefork (subst.c:77)
==10267==    by 0x42B318: execcmd (exec.c:2619)
==10267==    by 0x428CA0: execpline2 (exec.c:1697)
==10267==    by 0x427FD2: execpline (exec.c:1484)
==10267==    by 0x427756: execlist (exec.c:1267)
==10267==    by 0x42717C: execode (exec.c:1073)
==10267==    by 0x431299: runshfunc (exec.c:5040)
==10267==    by 0x430E76: doshfunc (exec.c:4920)
==10267==    by 0x4302FB: execshfunc (exec.c:4557)
==10267==    by 0x42D8C1: execcmd (exec.c:3373)
==10267== 
==10267== 
==10267== 2 errors in context 2 of 2:
==10267== Conditional jump or move depends on uninitialised value(s)
==10267==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10267==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10267==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10267==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10267==    by 0x42D8E9: execcmd (exec.c:3378)
==10267==    by 0x428CA0: execpline2 (exec.c:1697)
==10267==    by 0x427FD2: execpline (exec.c:1484)
==10267==    by 0x42779A: execlist (exec.c:1275)
==10267==    by 0x42717C: execode (exec.c:1073)
==10267==    by 0x431299: runshfunc (exec.c:5040)
==10267==    by 0x430E76: doshfunc (exec.c:4920)
==10267==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10267== 
==10267== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== HEAP SUMMARY:
==10272==     in use at exit: 3,115,184 bytes in 69,008 blocks
==10272==   total heap usage: 1,598,190 allocs, 1,529,182 frees, 129,192,256 bytes allocated
==10272== 
--10123-- Caught __NR_exit; running __libc_freeres()
==10271== LEAK SUMMARY:
==10271==    definitely lost: 2,197 bytes in 13 blocks
==10271==    indirectly lost: 6,756 bytes in 7 blocks
==10271==      possibly lost: 0 bytes in 0 blocks
==10271==    still reachable: 3,104,074 bytes in 68,955 blocks
==10271==         suppressed: 0 bytes in 0 blocks
==10271== Rerun with --leak-check=full to see details of leaked memory
==10271== 
==10271== Use --track-origins=yes to see where uninitialised values come from
==10271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10271== 
==10271== 1 errors in context 1 of 2:
==10271== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10271==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10271==    by 0x488CD0: stringsubst (subst.c:301)
==10271==    by 0x48801B: prefork (subst.c:77)
==10271==    by 0x42B318: execcmd (exec.c:2619)
==10271==    by 0x428CA0: execpline2 (exec.c:1697)
==10271==    by 0x427FD2: execpline (exec.c:1484)
==10271==    by 0x427756: execlist (exec.c:1267)
==10271==    by 0x42717C: execode (exec.c:1073)
==10271==    by 0x431299: runshfunc (exec.c:5040)
==10271==    by 0x430E76: doshfunc (exec.c:4920)
==10271==    by 0x4302FB: execshfunc (exec.c:4557)
==10271==    by 0x42D8C1: execcmd (exec.c:3373)
==10271== 
==10271== 
==10271== 2 errors in context 2 of 2:
==10271== Conditional jump or move depends on uninitialised value(s)
==10271==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10271==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10271==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10271==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10271==    by 0x42D8E9: execcmd (exec.c:3378)
==10271==    by 0x428CA0: execpline2 (exec.c:1697)
==10271==    by 0x427FD2: execpline (exec.c:1484)
==10271==    by 0x42779A: execlist (exec.c:1275)
==10271==    by 0x42717C: execode (exec.c:1073)
==10271==    by 0x431299: runshfunc (exec.c:5040)
==10271==    by 0x430E76: doshfunc (exec.c:4920)
==10271==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10271== 
==10271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== Searching for pointers to 69,008 not-freed blocks
--10272--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10272--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10272--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10272--   Scanning root segment: 0x4037000..0x403afff (16384)
--10272--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10272--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10272--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10272--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10272--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10272--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10272--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10272--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10272--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10272--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10272--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10272--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10272--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10272--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10272--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10272--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10272--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10272--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10272--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10272--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10272--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10272--   Scanning root segment: 0x701a000..0x701afff (4096)
--10272--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10272--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10272--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10272--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10272--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10272--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10272--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10272--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10272--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10272--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10273-by-pythonnut-on-???
==10273== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10273-by-pythonnut-on-???
==10273== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10273-by-pythonnut-on-???
==10273== 
==10273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10273== don't want to do, unless you know exactly what you're doing,
==10273== or are doing some strange experiment):
==10273==   /usr/lib/valgrind/../../bin/vgdb --pid=10273 ...command...
==10273== 
==10273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10273==   /path/to/gdb ./zsh
==10273== and then give GDB the following command
==10273==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10273
==10273== --pid is optional if only one valgrind process is running
==10273== 
--10123-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10273-- Caught __NR_exit; running __libc_freeres()
==10123== 
==10123== HEAP SUMMARY:
==10123==     in use at exit: 3,133,478 bytes in 69,401 blocks
==10123==   total heap usage: 1,595,176 allocs, 1,525,775 frees, 128,954,929 bytes allocated
==10123== 
--10273-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10273== 
==10273== HEAP SUMMARY:
==10273==     in use at exit: 3,111,547 bytes in 68,915 blocks
==10273==   total heap usage: 1,598,130 allocs, 1,529,215 frees, 129,081,019 bytes allocated
==10273== 
==10123== Searching for pointers to 69,401 not-freed blocks
--10123--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10123--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10123--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10123--   Scanning root segment: 0x4037000..0x403afff (16384)
--10123--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10123--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10123--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10123--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10123--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10123--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10123--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10123--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10123--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10123--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10123--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10123--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10123--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10123--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10123--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10123--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10123--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10123--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10123--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10123--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10123--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10123--   Scanning root segment: 0x701a000..0x701afff (4096)
--10123--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10123--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10123--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10123--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10123--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10123--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10123--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10123--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10123--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10123--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10273== Searching for pointers to 68,915 not-freed blocks
--10273--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10273--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10273--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10273--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10273--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10273--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10273--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10273--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10273--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10273--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10273--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10273--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10273--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10273--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10273--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10273--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10273--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10273--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10273--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10273--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10273--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10273--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10273--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10273--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10273--   Scanning root segment: 0x701a000..0x701afff (4096)
--10273--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10273--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10273--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10273--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10273--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10273--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10273--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10273--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10273--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10273--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10272== Checked 4,790,344 bytes
==10272== 
==10272== LEAK SUMMARY:
==10272==    definitely lost: 2,197 bytes in 13 blocks
==10272==    indirectly lost: 6,756 bytes in 7 blocks
==10272==      possibly lost: 0 bytes in 0 blocks
==10272==    still reachable: 3,106,231 bytes in 68,988 blocks
==10272==         suppressed: 0 bytes in 0 blocks
==10272== Rerun with --leak-check=full to see details of leaked memory
==10272== 
==10272== Use --track-origins=yes to see where uninitialised values come from
==10272== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== 
==10272== 1 errors in context 1 of 2:
==10272== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10272==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272==    by 0x488CD0: stringsubst (subst.c:301)
==10272==    by 0x48801B: prefork (subst.c:77)
==10272==    by 0x42B318: execcmd (exec.c:2619)
==10272==    by 0x428CA0: execpline2 (exec.c:1697)
==10272==    by 0x427FD2: execpline (exec.c:1484)
==10272==    by 0x427756: execlist (exec.c:1267)
==10272==    by 0x42717C: execode (exec.c:1073)
==10272==    by 0x431299: runshfunc (exec.c:5040)
==10272==    by 0x430E76: doshfunc (exec.c:4920)
==10272==    by 0x4302FB: execshfunc (exec.c:4557)
==10272==    by 0x42D8C1: execcmd (exec.c:3373)
==10272== 
==10272== 
==10272== 2 errors in context 2 of 2:
==10272== Conditional jump or move depends on uninitialised value(s)
==10272==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10272==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10272==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10272==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10272==    by 0x42D8E9: execcmd (exec.c:3378)
==10272==    by 0x428CA0: execpline2 (exec.c:1697)
==10272==    by 0x427FD2: execpline (exec.c:1484)
==10272==    by 0x42779A: execlist (exec.c:1275)
==10272==    by 0x42717C: execode (exec.c:1073)
==10272==    by 0x431299: runshfunc (exec.c:5040)
==10272==    by 0x430E76: doshfunc (exec.c:4920)
==10272==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10272== 
==10272== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10274-by-pythonnut-on-???
==10274== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10274-by-pythonnut-on-???
==10274== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10274-by-pythonnut-on-???
==10274== 
==10274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10274== don't want to do, unless you know exactly what you're doing,
==10274== or are doing some strange experiment):
==10274==   /usr/lib/valgrind/../../bin/vgdb --pid=10274 ...command...
==10274== 
==10274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10274==   /path/to/gdb ./zsh
==10274== and then give GDB the following command
==10274==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10274
==10274== --pid is optional if only one valgrind process is running
==10274== 
--10274-- Caught __NR_exit; running __libc_freeres()
==10123== Checked 4,816,336 bytes
==10123== 
--10274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10273== Checked 4,765,880 bytes
==10273== 
==10123== LEAK SUMMARY:
==10123==    definitely lost: 2,221 bytes in 14 blocks
==10123==    indirectly lost: 6,796 bytes in 9 blocks
==10123==      possibly lost: 0 bytes in 0 blocks
==10123==    still reachable: 3,124,461 bytes in 69,378 blocks
==10123==         suppressed: 0 bytes in 0 blocks
==10123== Rerun with --leak-check=full to see details of leaked memory
==10123== 
==10123== Use --track-origins=yes to see where uninitialised values come from
==10123== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10123== 
==10123== 1 errors in context 1 of 2:
==10123== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10123==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10123==    by 0x488CD0: stringsubst (subst.c:301)
==10123==    by 0x48801B: prefork (subst.c:77)
==10123==    by 0x42B318: execcmd (exec.c:2619)
==10123==    by 0x428CA0: execpline2 (exec.c:1697)
==10123==    by 0x427FD2: execpline (exec.c:1484)
==10123==    by 0x427756: execlist (exec.c:1267)
==10123==    by 0x42717C: execode (exec.c:1073)
==10123==    by 0x431299: runshfunc (exec.c:5040)
==10123==    by 0x430E76: doshfunc (exec.c:4920)
==10123==    by 0x4302FB: execshfunc (exec.c:4557)
==10123==    by 0x42D8C1: execcmd (exec.c:3373)
==10123== 
==10123== 
==10123== 2 errors in context 2 of 2:
==10123== Conditional jump or move depends on uninitialised value(s)
==10123==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10123==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10123==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10123==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10123==    by 0x42D8E9: execcmd (exec.c:3378)
==10123==    by 0x428CA0: execpline2 (exec.c:1697)
==10123==    by 0x427FD2: execpline (exec.c:1484)
==10123==    by 0x42779A: execlist (exec.c:1275)
==10123==    by 0x42717C: execode (exec.c:1073)
==10123==    by 0x431299: runshfunc (exec.c:5040)
==10123==    by 0x430E76: doshfunc (exec.c:4920)
==10123==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10123== 
==10123== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== 
==10274== HEAP SUMMARY:
==10274==     in use at exit: 3,115,183 bytes in 69,008 blocks
==10274==   total heap usage: 1,598,195 allocs, 1,529,187 frees, 129,194,369 bytes allocated
==10274== 
==10273== LEAK SUMMARY:
==10273==    definitely lost: 2,197 bytes in 13 blocks
==10273==    indirectly lost: 6,756 bytes in 7 blocks
==10273==      possibly lost: 0 bytes in 0 blocks
==10273==    still reachable: 3,102,594 bytes in 68,895 blocks
==10273==         suppressed: 0 bytes in 0 blocks
==10273== Rerun with --leak-check=full to see details of leaked memory
==10273== 
==10273== Use --track-origins=yes to see where uninitialised values come from
==10273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10273== 
==10273== 1 errors in context 1 of 2:
==10273== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10273==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10273==    by 0x488CD0: stringsubst (subst.c:301)
==10273==    by 0x48801B: prefork (subst.c:77)
==10273==    by 0x42B318: execcmd (exec.c:2619)
==10273==    by 0x428CA0: execpline2 (exec.c:1697)
==10273==    by 0x427FD2: execpline (exec.c:1484)
==10273==    by 0x427756: execlist (exec.c:1267)
==10273==    by 0x42717C: execode (exec.c:1073)
==10273==    by 0x431299: runshfunc (exec.c:5040)
==10273==    by 0x430E76: doshfunc (exec.c:4920)
==10273==    by 0x4302FB: execshfunc (exec.c:4557)
==10273==    by 0x42D8C1: execcmd (exec.c:3373)
==10273== 
==10273== 
==10273== 2 errors in context 2 of 2:
==10273== Conditional jump or move depends on uninitialised value(s)
==10273==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10273==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10273==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10273==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10273==    by 0x42D8E9: execcmd (exec.c:3378)
==10273==    by 0x428CA0: execpline2 (exec.c:1697)
==10273==    by 0x427FD2: execpline (exec.c:1484)
==10273==    by 0x42779A: execlist (exec.c:1275)
==10273==    by 0x42717C: execode (exec.c:1073)
==10273==    by 0x431299: runshfunc (exec.c:5040)
==10273==    by 0x430E76: doshfunc (exec.c:4920)
==10273==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10273== 
==10273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10275-by-pythonnut-on-???
==10275== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10275-by-pythonnut-on-???
==10275== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10275-by-pythonnut-on-???
==10275== 
==10275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10275== don't want to do, unless you know exactly what you're doing,
==10275== or are doing some strange experiment):
==10275==   /usr/lib/valgrind/../../bin/vgdb --pid=10275 ...command...
==10275== 
==10275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10275==   /path/to/gdb ./zsh
==10275== and then give GDB the following command
==10275==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10275
==10275== --pid is optional if only one valgrind process is running
==10275== 
==10274== Searching for pointers to 69,008 not-freed blocks
--10274--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10274--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10274--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10274--   Scanning root segment: 0x4037000..0x403afff (16384)
--10274--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10274--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10274--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10274--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10274--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10274--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10274--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10274--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10274--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10274--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10274--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10274--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10274--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10274--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10274--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10274--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10274--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10274--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10274--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10274--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10274--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10274--   Scanning root segment: 0x701a000..0x701afff (4096)
--10274--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10274--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10274--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10274--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10274--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10274--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10274--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10274--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10274--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10274--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFE8AAC,  len 4
==10277== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10277-by-pythonnut-on-???
==10277== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10277-by-pythonnut-on-???
==10277== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10277-by-pythonnut-on-???
==10277== 
==10277== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10277== don't want to do, unless you know exactly what you're doing,
==10277== or are doing some strange experiment):
==10277==   /usr/lib/valgrind/../../bin/vgdb --pid=10277 ...command...
==10277== 
==10277== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10277==   /path/to/gdb ./zsh
==10277== and then give GDB the following command
==10277==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10277
==10277== --pid is optional if only one valgrind process is running
==10277== 
--10276-- Caught __NR_exit; running __libc_freeres()
==10276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10276-by-pythonnut-on-???
==10276== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10276-by-pythonnut-on-???
==10276== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10276-by-pythonnut-on-???
==10276== 
==10276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10276== don't want to do, unless you know exactly what you're doing,
==10276== or are doing some strange experiment):
==10276==   /usr/lib/valgrind/../../bin/vgdb --pid=10276 ...command...
==10276== 
==10276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10276==   /path/to/gdb ./zsh
==10276== and then give GDB the following command
==10276==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10276
==10276== --pid is optional if only one valgrind process is running
==10276== 
--10276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10279-- Caught __NR_exit; running __libc_freeres()
==10276== 
==10279== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10279-by-pythonnut-on-???
==10279== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10279-by-pythonnut-on-???
==10279== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10279-by-pythonnut-on-???
==10279== 
==10279== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10279== don't want to do, unless you know exactly what you're doing,
==10279== or are doing some strange experiment):
==10279==   /usr/lib/valgrind/../../bin/vgdb --pid=10279 ...command...
==10279== 
==10279== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10279==   /path/to/gdb ./zsh
==10279== and then give GDB the following command
==10279==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10279
==10279== --pid is optional if only one valgrind process is running
==10279== 
==10276== HEAP SUMMARY:
==10276==     in use at exit: 3,135,430 bytes in 69,472 blocks
==10276==   total heap usage: 1,595,060 allocs, 1,525,588 frees, 128,911,104 bytes allocated
==10276== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--10279-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10279== 
==10276== Searching for pointers to 69,472 not-freed blocks
--10276--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10276--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==10279== HEAP SUMMARY:
==10279==     in use at exit: 3,123,779 bytes in 69,155 blocks
==10279==   total heap usage: 1,598,522 allocs, 1,529,367 frees, 129,113,456 bytes allocated
==10279== 
--10276--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10276--   Scanning root segment: 0x4037000..0x403afff (16384)
--10276--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10276--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10276--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10276--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10276--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10276--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10276--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10276--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10276--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10276--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10276--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10276--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10276--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10276--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10276--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10276--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10276--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10276--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10276--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10276--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10276--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10276--   Scanning root segment: 0x701a000..0x701afff (4096)
--10276--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10276--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10276--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10276--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10276--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10276--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10276--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10276--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10276--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10276--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10274== Checked 4,790,344 bytes
==10274== 
==10279== Searching for pointers to 69,155 not-freed blocks
--10279--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10279--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10279--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10279--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10279--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10279--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10279--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10279--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10279--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10279--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10279--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10279--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10279--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10279--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10279--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10279--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10279--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10279--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10279--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10279--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10279--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10279--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10279--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10279--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10279--   Scanning root segment: 0x701a000..0x701afff (4096)
--10279--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10279--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10279--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10279--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10279--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10279--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10279--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10279--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10279--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10279--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10274== LEAK SUMMARY:
==10274==    definitely lost: 2,197 bytes in 13 blocks
==10274==    indirectly lost: 6,756 bytes in 7 blocks
==10274==      possibly lost: 0 bytes in 0 blocks
==10274==    still reachable: 3,106,230 bytes in 68,988 blocks
==10274==         suppressed: 0 bytes in 0 blocks
==10274== Rerun with --leak-check=full to see details of leaked memory
==10274== 
==10274== Use --track-origins=yes to see where uninitialised values come from
==10274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== 
==10274== 1 errors in context 1 of 2:
==10274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10274==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10274==    by 0x488CD0: stringsubst (subst.c:301)
==10274==    by 0x48801B: prefork (subst.c:77)
==10274==    by 0x42B318: execcmd (exec.c:2619)
==10274==    by 0x428CA0: execpline2 (exec.c:1697)
==10274==    by 0x427FD2: execpline (exec.c:1484)
==10274==    by 0x427756: execlist (exec.c:1267)
==10274==    by 0x42717C: execode (exec.c:1073)
==10274==    by 0x431299: runshfunc (exec.c:5040)
==10274==    by 0x430E76: doshfunc (exec.c:4920)
==10274==    by 0x4302FB: execshfunc (exec.c:4557)
==10274==    by 0x42D8C1: execcmd (exec.c:3373)
==10274== 
==10274== 
==10274== 2 errors in context 2 of 2:
==10274== Conditional jump or move depends on uninitialised value(s)
==10274==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10274==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10274==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10274==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10274==    by 0x42D8E9: execcmd (exec.c:3378)
==10274==    by 0x428CA0: execpline2 (exec.c:1697)
==10274==    by 0x427FD2: execpline (exec.c:1484)
==10274==    by 0x42779A: execlist (exec.c:1275)
==10274==    by 0x42717C: execode (exec.c:1073)
==10274==    by 0x431299: runshfunc (exec.c:5040)
==10274==    by 0x430E76: doshfunc (exec.c:4920)
==10274==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10274== 
==10274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10281-by-pythonnut-on-???
==10281== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10281-by-pythonnut-on-???
==10281== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10281-by-pythonnut-on-???
==10281== 
==10281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10281== don't want to do, unless you know exactly what you're doing,
==10281== or are doing some strange experiment):
==10281==   /usr/lib/valgrind/../../bin/vgdb --pid=10281 ...command...
==10281== 
==10281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10281==   /path/to/gdb ./zsh
==10281== and then give GDB the following command
==10281==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10281
==10281== --pid is optional if only one valgrind process is running
==10281== 
--10281-- Caught __NR_exit; running __libc_freeres()
--10281-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10281== 
==10281== HEAP SUMMARY:
==10281==     in use at exit: 3,115,182 bytes in 69,008 blocks
==10281==   total heap usage: 1,598,200 allocs, 1,529,192 frees, 129,196,482 bytes allocated
==10281== 
==10276== Checked 4,820,104 bytes
==10276== 
==10281== Searching for pointers to 69,008 not-freed blocks
--10281--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10281--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10281--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10281--   Scanning root segment: 0x4037000..0x403afff (16384)
--10281--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10281--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10281--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10281--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10281--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10281--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10281--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10281--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10281--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10281--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10281--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10281--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10281--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10281--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10281--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10281--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10281--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10281--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10281--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10281--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10281--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10281--   Scanning root segment: 0x701a000..0x701afff (4096)
--10281--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10281--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10281--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10281--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10281--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10281--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10281--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10281--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10281--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10281--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10276== LEAK SUMMARY:
==10276==    definitely lost: 2,221 bytes in 14 blocks
==10276==    indirectly lost: 6,796 bytes in 9 blocks
==10276==      possibly lost: 0 bytes in 0 blocks
==10276==    still reachable: 3,126,413 bytes in 69,449 blocks
==10276==         suppressed: 0 bytes in 0 blocks
==10276== Rerun with --leak-check=full to see details of leaked memory
==10276== 
==10276== Use --track-origins=yes to see where uninitialised values come from
==10276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10276== 
==10276== 1 errors in context 1 of 2:
==10276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10276==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10276==    by 0x488CD0: stringsubst (subst.c:301)
==10276==    by 0x48801B: prefork (subst.c:77)
==10276==    by 0x42B318: execcmd (exec.c:2619)
==10276==    by 0x428CA0: execpline2 (exec.c:1697)
==10276==    by 0x427FD2: execpline (exec.c:1484)
==10276==    by 0x427756: execlist (exec.c:1267)
==10276==    by 0x42717C: execode (exec.c:1073)
==10276==    by 0x431299: runshfunc (exec.c:5040)
==10276==    by 0x430E76: doshfunc (exec.c:4920)
==10276==    by 0x4302FB: execshfunc (exec.c:4557)
==10276==    by 0x42D8C1: execcmd (exec.c:3373)
==10276== 
==10276== 
==10276== 2 errors in context 2 of 2:
==10276== Conditional jump or move depends on uninitialised value(s)
==10276==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10276==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10276==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10276==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10276==    by 0x42D8E9: execcmd (exec.c:3378)
==10276==    by 0x428CA0: execpline2 (exec.c:1697)
==10276==    by 0x427FD2: execpline (exec.c:1484)
==10276==    by 0x42779A: execlist (exec.c:1275)
==10276==    by 0x42717C: execode (exec.c:1073)
==10276==    by 0x431299: runshfunc (exec.c:5040)
==10276==    by 0x430E76: doshfunc (exec.c:4920)
==10276==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10276== 
==10276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10279== Checked 4,785,128 bytes
==10279== 
==10279== LEAK SUMMARY:
==10279==    definitely lost: 2,197 bytes in 13 blocks
==10279==    indirectly lost: 6,756 bytes in 7 blocks
==10279==      possibly lost: 0 bytes in 0 blocks
==10279==    still reachable: 3,114,826 bytes in 69,135 blocks
==10279==         suppressed: 0 bytes in 0 blocks
==10279== Rerun with --leak-check=full to see details of leaked memory
==10279== 
==10279== Use --track-origins=yes to see where uninitialised values come from
==10279== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10279== 
==10279== 1 errors in context 1 of 2:
==10279== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10279==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10279==    by 0x488CD0: stringsubst (subst.c:301)
==10279==    by 0x48801B: prefork (subst.c:77)
==10279==    by 0x42B318: execcmd (exec.c:2619)
==10279==    by 0x428CA0: execpline2 (exec.c:1697)
==10279==    by 0x427FD2: execpline (exec.c:1484)
==10279==    by 0x427756: execlist (exec.c:1267)
==10279==    by 0x42717C: execode (exec.c:1073)
==10279==    by 0x431299: runshfunc (exec.c:5040)
==10279==    by 0x430E76: doshfunc (exec.c:4920)
==10279==    by 0x4302FB: execshfunc (exec.c:4557)
==10279==    by 0x42D8C1: execcmd (exec.c:3373)
==10279== 
==10279== 
==10279== 2 errors in context 2 of 2:
==10279== Conditional jump or move depends on uninitialised value(s)
==10279==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10279==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10279==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10279==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10279==    by 0x42D8E9: execcmd (exec.c:3378)
==10279==    by 0x428CA0: execpline2 (exec.c:1697)
==10279==    by 0x427FD2: execpline (exec.c:1484)
==10279==    by 0x42779A: execlist (exec.c:1275)
==10279==    by 0x42717C: execode (exec.c:1073)
==10279==    by 0x431299: runshfunc (exec.c:5040)
==10279==    by 0x430E76: doshfunc (exec.c:4920)
==10279==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10279== 
==10279== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE8F5C,  len 4
--10278-- Caught __NR_exit; running __libc_freeres()
==10278== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10278-by-pythonnut-on-???
==10278== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10278-by-pythonnut-on-???
==10278== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10278-by-pythonnut-on-???
==10278== 
==10278== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10278== don't want to do, unless you know exactly what you're doing,
==10278== or are doing some strange experiment):
==10278==   /usr/lib/valgrind/../../bin/vgdb --pid=10278 ...command...
==10278== 
==10278== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10278==   /path/to/gdb ./zsh
==10278== and then give GDB the following command
==10278==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10278
==10278== --pid is optional if only one valgrind process is running
==10278== 
--10278-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10278== 
==10278== HEAP SUMMARY:
==10278==     in use at exit: 3,123,715 bytes in 69,152 blocks
==10278==   total heap usage: 1,598,520 allocs, 1,529,368 frees, 129,113,215 bytes allocated
==10278== 
==10278== Searching for pointers to 69,152 not-freed blocks
--10278--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10278--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10278--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10278--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10278--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10278--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10278--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10278--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10278--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10278--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10278--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10278--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10278--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10278--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10278--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10278--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10278--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10278--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10278--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10278--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10278--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10278--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10278--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10278--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10278--   Scanning root segment: 0x701a000..0x701afff (4096)
--10278--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10278--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10278--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10278--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10278--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10278--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10278--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10278--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10278--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10278--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10281== Checked 4,790,344 bytes
==10281== 
==10281== LEAK SUMMARY:
==10281==    definitely lost: 2,197 bytes in 13 blocks
==10281==    indirectly lost: 6,756 bytes in 7 blocks
==10281==      possibly lost: 0 bytes in 0 blocks
==10281==    still reachable: 3,106,229 bytes in 68,988 blocks
==10281==         suppressed: 0 bytes in 0 blocks
==10281== Rerun with --leak-check=full to see details of leaked memory
==10281== 
==10281== Use --track-origins=yes to see where uninitialised values come from
==10281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10281== 
==10281== 1 errors in context 1 of 2:
==10281== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10281==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10281==    by 0x488CD0: stringsubst (subst.c:301)
==10281==    by 0x48801B: prefork (subst.c:77)
==10281==    by 0x42B318: execcmd (exec.c:2619)
==10281==    by 0x428CA0: execpline2 (exec.c:1697)
==10281==    by 0x427FD2: execpline (exec.c:1484)
==10281==    by 0x427756: execlist (exec.c:1267)
==10281==    by 0x42717C: execode (exec.c:1073)
==10281==    by 0x431299: runshfunc (exec.c:5040)
==10281==    by 0x430E76: doshfunc (exec.c:4920)
==10281==    by 0x4302FB: execshfunc (exec.c:4557)
==10281==    by 0x42D8C1: execcmd (exec.c:3373)
==10281== 
==10281== 
==10281== 2 errors in context 2 of 2:
==10281== Conditional jump or move depends on uninitialised value(s)
==10281==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10281==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10281==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10281==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10281==    by 0x42D8E9: execcmd (exec.c:3378)
==10281==    by 0x428CA0: execpline2 (exec.c:1697)
==10281==    by 0x427FD2: execpline (exec.c:1484)
==10281==    by 0x42779A: execlist (exec.c:1275)
==10281==    by 0x42717C: execode (exec.c:1073)
==10281==    by 0x431299: runshfunc (exec.c:5040)
==10281==    by 0x430E76: doshfunc (exec.c:4920)
==10281==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10281== 
==10281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10328-by-pythonnut-on-???
==10328== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10328-by-pythonnut-on-???
==10328== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10328-by-pythonnut-on-???
==10328== 
==10328== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10328== don't want to do, unless you know exactly what you're doing,
==10328== or are doing some strange experiment):
==10328==   /usr/lib/valgrind/../../bin/vgdb --pid=10328 ...command...
==10328== 
==10328== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10328==   /path/to/gdb ./zsh
==10328== and then give GDB the following command
==10328==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10328
==10328== --pid is optional if only one valgrind process is running
==10328== 
--10328-- Caught __NR_exit; running __libc_freeres()
--10282-- Caught __NR_exit; running __libc_freeres()
==10282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10282-by-pythonnut-on-???
==10282== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10282-by-pythonnut-on-???
==10282== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10282-by-pythonnut-on-???
==10282== 
==10282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10282== don't want to do, unless you know exactly what you're doing,
==10282== or are doing some strange experiment):
==10282==   /usr/lib/valgrind/../../bin/vgdb --pid=10282 ...command...
==10282== 
==10282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10282==   /path/to/gdb ./zsh
==10282== and then give GDB the following command
==10282==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10282
==10282== --pid is optional if only one valgrind process is running
==10282== 
--10328-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10328== 
==10278== Checked 4,784,448 bytes
==10278== 
==10328== HEAP SUMMARY:
==10328==     in use at exit: 3,115,181 bytes in 69,008 blocks
==10328==   total heap usage: 1,598,205 allocs, 1,529,197 frees, 129,198,595 bytes allocated
==10328== 
--10282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10282== 
==10282== HEAP SUMMARY:
==10282==     in use at exit: 3,135,707 bytes in 69,477 blocks
==10282==   total heap usage: 1,595,073 allocs, 1,525,596 frees, 128,915,101 bytes allocated
==10282== 
==10278== LEAK SUMMARY:
==10278==    definitely lost: 2,197 bytes in 13 blocks
==10278==    indirectly lost: 6,756 bytes in 7 blocks
==10278==      possibly lost: 0 bytes in 0 blocks
==10278==    still reachable: 3,114,762 bytes in 69,132 blocks
==10278==         suppressed: 0 bytes in 0 blocks
==10278== Rerun with --leak-check=full to see details of leaked memory
==10278== 
==10278== Use --track-origins=yes to see where uninitialised values come from
==10278== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10278== 
==10278== 1 errors in context 1 of 2:
==10278== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10278==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10278==    by 0x488CD0: stringsubst (subst.c:301)
==10278==    by 0x48801B: prefork (subst.c:77)
==10278==    by 0x42B318: execcmd (exec.c:2619)
==10278==    by 0x428CA0: execpline2 (exec.c:1697)
==10278==    by 0x427FD2: execpline (exec.c:1484)
==10278==    by 0x427756: execlist (exec.c:1267)
==10278==    by 0x42717C: execode (exec.c:1073)
==10278==    by 0x431299: runshfunc (exec.c:5040)
==10278==    by 0x430E76: doshfunc (exec.c:4920)
==10278==    by 0x4302FB: execshfunc (exec.c:4557)
==10278==    by 0x42D8C1: execcmd (exec.c:3373)
==10278== 
==10278== 
==10278== 2 errors in context 2 of 2:
==10278== Conditional jump or move depends on uninitialised value(s)
==10278==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10278==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10278==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10278==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10278==    by 0x42D8E9: execcmd (exec.c:3378)
==10278==    by 0x428CA0: execpline2 (exec.c:1697)
==10278==    by 0x427FD2: execpline (exec.c:1484)
==10278==    by 0x42779A: execlist (exec.c:1275)
==10278==    by 0x42717C: execode (exec.c:1073)
==10278==    by 0x431299: runshfunc (exec.c:5040)
==10278==    by 0x430E76: doshfunc (exec.c:4920)
==10278==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10278== 
==10278== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== Searching for pointers to 69,008 not-freed blocks
--10328--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10328--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10328--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10328--   Scanning root segment: 0x4037000..0x403afff (16384)
--10328--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10328--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10328--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10328--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10328--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10328--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10328--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10328--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10328--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10328--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10328--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10328--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10328--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10328--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10328--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10328--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10328--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10328--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10328--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10328--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10328--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10328--   Scanning root segment: 0x701a000..0x701afff (4096)
--10328--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10328--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10328--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10328--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10328--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10328--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10328--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10328--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10328--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10328--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10282== Searching for pointers to 69,477 not-freed blocks
--10282--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10282--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10282--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10282--   Scanning root segment: 0x4037000..0x403efff (32768)
--10282--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10282--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10282--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10282--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10282--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10282--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10282--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10282--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10282--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10282--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10282--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10282--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10282--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10282--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10282--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10282--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10282--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10333-- Caught __NR_exit; running __libc_freeres()
--10282--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10282--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10282--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10282--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10282--   Scanning root segment: 0x701a000..0x701afff (4096)
--10282--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10282--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10282--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10282--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10282--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10282--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10282--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10282--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10282--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10282--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10333-by-pythonnut-on-???
==10333== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10333-by-pythonnut-on-???
==10333== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10333-by-pythonnut-on-???
==10333== 
==10333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10333== don't want to do, unless you know exactly what you're doing,
==10333== or are doing some strange experiment):
==10333==   /usr/lib/valgrind/../../bin/vgdb --pid=10333 ...command...
==10333== 
==10333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10333==   /path/to/gdb ./zsh
==10333== and then give GDB the following command
==10333==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10333
==10333== --pid is optional if only one valgrind process is running
==10333== 
--10333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10333== 
==10333== HEAP SUMMARY:
==10333==     in use at exit: 3,123,722 bytes in 69,152 blocks
==10333==   total heap usage: 1,598,535 allocs, 1,529,383 frees, 129,118,213 bytes allocated
==10333== 
==10333== Searching for pointers to 69,152 not-freed blocks
--10333--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10333--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10333--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10333--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10333--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10333--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10333--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10333--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10333--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10333--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10333--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10333--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10333--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10333--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10333--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10333--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10333--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10333--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10333--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10333--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10333--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10333--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10333--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10333--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10333--   Scanning root segment: 0x701a000..0x701afff (4096)
--10333--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10333--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10333--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10333--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10333--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10333--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10333--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10333--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10333--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10333--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10328== Checked 4,790,344 bytes
==10328== 
==10282== Checked 4,836,472 bytes
==10282== 
==10328== LEAK SUMMARY:
==10328==    definitely lost: 2,197 bytes in 13 blocks
==10328==    indirectly lost: 6,756 bytes in 7 blocks
==10328==      possibly lost: 0 bytes in 0 blocks
==10328==    still reachable: 3,106,228 bytes in 68,988 blocks
==10328==         suppressed: 0 bytes in 0 blocks
==10328== Rerun with --leak-check=full to see details of leaked memory
==10328== 
==10328== Use --track-origins=yes to see where uninitialised values come from
==10328== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== 
==10328== 1 errors in context 1 of 2:
==10328== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10328==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10328==    by 0x488CD0: stringsubst (subst.c:301)
==10328==    by 0x48801B: prefork (subst.c:77)
==10328==    by 0x42B318: execcmd (exec.c:2619)
==10328==    by 0x428CA0: execpline2 (exec.c:1697)
==10328==    by 0x427FD2: execpline (exec.c:1484)
==10328==    by 0x427756: execlist (exec.c:1267)
==10328==    by 0x42717C: execode (exec.c:1073)
==10328==    by 0x431299: runshfunc (exec.c:5040)
==10328==    by 0x430E76: doshfunc (exec.c:4920)
==10328==    by 0x4302FB: execshfunc (exec.c:4557)
==10328==    by 0x42D8C1: execcmd (exec.c:3373)
==10328== 
==10328== 
==10328== 2 errors in context 2 of 2:
==10328== Conditional jump or move depends on uninitialised value(s)
==10328==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10328==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10328==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10328==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10328==    by 0x42D8E9: execcmd (exec.c:3378)
==10328==    by 0x428CA0: execpline2 (exec.c:1697)
==10328==    by 0x427FD2: execpline (exec.c:1484)
==10328==    by 0x42779A: execlist (exec.c:1275)
==10328==    by 0x42717C: execode (exec.c:1073)
==10328==    by 0x431299: runshfunc (exec.c:5040)
==10328==    by 0x430E76: doshfunc (exec.c:4920)
==10328==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10328== 
==10328== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10282== LEAK SUMMARY:
==10282==    definitely lost: 2,221 bytes in 14 blocks
==10282==    indirectly lost: 6,796 bytes in 9 blocks
==10282==      possibly lost: 0 bytes in 0 blocks
==10282==    still reachable: 3,126,690 bytes in 69,454 blocks
==10282==         suppressed: 0 bytes in 0 blocks
==10282== Rerun with --leak-check=full to see details of leaked memory
==10282== 
==10282== Use --track-origins=yes to see where uninitialised values come from
==10282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10282== 
==10282== 1 errors in context 1 of 2:
==10282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10282==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10282==    by 0x488CD0: stringsubst (subst.c:301)
==10282==    by 0x48801B: prefork (subst.c:77)
==10282==    by 0x42B318: execcmd (exec.c:2619)
==10282==    by 0x428CA0: execpline2 (exec.c:1697)
==10282==    by 0x427FD2: execpline (exec.c:1484)
==10282==    by 0x427756: execlist (exec.c:1267)
==10282==    by 0x42717C: execode (exec.c:1073)
==10282==    by 0x431299: runshfunc (exec.c:5040)
==10282==    by 0x430E76: doshfunc (exec.c:4920)
==10282==    by 0x4302FB: execshfunc (exec.c:4557)
==10282==    by 0x42D8C1: execcmd (exec.c:3373)
==10282== 
==10282== 
==10282== 2 errors in context 2 of 2:
==10282== Conditional jump or move depends on uninitialised value(s)
==10282==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10282==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10282==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10282==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10282==    by 0x42D8E9: execcmd (exec.c:3378)
==10282==    by 0x428CA0: execpline2 (exec.c:1697)
==10282==    by 0x427FD2: execpline (exec.c:1484)
==10282==    by 0x42779A: execlist (exec.c:1275)
==10282==    by 0x42717C: execode (exec.c:1073)
==10282==    by 0x431299: runshfunc (exec.c:5040)
==10282==    by 0x430E76: doshfunc (exec.c:4920)
==10282==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10282== 
==10282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10334-by-pythonnut-on-???
==10334== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10334-by-pythonnut-on-???
==10334== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10334-by-pythonnut-on-???
==10334== 
==10334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10334== don't want to do, unless you know exactly what you're doing,
==10334== or are doing some strange experiment):
==10334==   /usr/lib/valgrind/../../bin/vgdb --pid=10334 ...command...
==10334== 
==10334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10334==   /path/to/gdb ./zsh
==10334== and then give GDB the following command
==10334==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10334
==10334== --pid is optional if only one valgrind process is running
==10334== 
--10334-- Caught __NR_exit; running __libc_freeres()
--10275-- Caught __NR_exit; running __libc_freeres()
--10334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10275-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10334== 
==10334== HEAP SUMMARY:
==10334==     in use at exit: 3,115,180 bytes in 69,008 blocks
==10334==   total heap usage: 1,598,213 allocs, 1,529,205 frees, 129,202,248 bytes allocated
==10334== 
==10275== 
==10333== Checked 4,784,584 bytes
==10333== 
==10275== HEAP SUMMARY:
==10275==     in use at exit: 3,133,543 bytes in 69,402 blocks
==10275==   total heap usage: 1,595,024 allocs, 1,525,622 frees, 128,915,712 bytes allocated
==10275== 
==10333== LEAK SUMMARY:
==10333==    definitely lost: 2,197 bytes in 13 blocks
==10333==    indirectly lost: 6,756 bytes in 7 blocks
==10333==      possibly lost: 0 bytes in 0 blocks
==10333==    still reachable: 3,114,769 bytes in 69,132 blocks
==10333==         suppressed: 0 bytes in 0 blocks
==10333== Rerun with --leak-check=full to see details of leaked memory
==10333== 
==10333== Use --track-origins=yes to see where uninitialised values come from
==10333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10333== 
==10333== 1 errors in context 1 of 2:
==10333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10333==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10333==    by 0x488CD0: stringsubst (subst.c:301)
==10333==    by 0x48801B: prefork (subst.c:77)
==10333==    by 0x42B318: execcmd (exec.c:2619)
==10333==    by 0x428CA0: execpline2 (exec.c:1697)
==10333==    by 0x427FD2: execpline (exec.c:1484)
==10333==    by 0x427756: execlist (exec.c:1267)
==10333==    by 0x42717C: execode (exec.c:1073)
==10333==    by 0x431299: runshfunc (exec.c:5040)
==10333==    by 0x430E76: doshfunc (exec.c:4920)
==10333==    by 0x4302FB: execshfunc (exec.c:4557)
==10333==    by 0x42D8C1: execcmd (exec.c:3373)
==10333== 
==10333== 
==10333== 2 errors in context 2 of 2:
==10333== Conditional jump or move depends on uninitialised value(s)
==10333==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10333==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10333==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10333==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10333==    by 0x42D8E9: execcmd (exec.c:3378)
==10333==    by 0x428CA0: execpline2 (exec.c:1697)
==10333==    by 0x427FD2: execpline (exec.c:1484)
==10333==    by 0x42779A: execlist (exec.c:1275)
==10333==    by 0x42717C: execode (exec.c:1073)
==10333==    by 0x431299: runshfunc (exec.c:5040)
==10333==    by 0x430E76: doshfunc (exec.c:4920)
==10333==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10333== 
==10333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== Searching for pointers to 69,008 not-freed blocks
--10334--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10334--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10334--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10334--   Scanning root segment: 0x4037000..0x403afff (16384)
--10334--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10334--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10334--   Scanning root segment: 0x4223000..0x4223fff (4096)
==10275== Searching for pointers to 69,402 not-freed blocks
--10275--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10334--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10334--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10275--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10334--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10334--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10334--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10334--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10334--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10334--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10334--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10275--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10334--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10334--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10275--   Scanning root segment: 0x4037000..0x403afff (16384)
--10275--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10334--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10334--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10334--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10275--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10275--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10275--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10275--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10275--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10275--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10275--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10275--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10275--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10275--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10275--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10275--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10275--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10334--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10275--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10334--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10275--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10275--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10334--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10334--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10334--   Scanning root segment: 0x701a000..0x701afff (4096)
--10275--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10334--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10275--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10334--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10275--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10275--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10334--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10275--   Scanning root segment: 0x701a000..0x701afff (4096)
--10275--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10334--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10275--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10334--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10275--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10334--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10275--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10334--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10275--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10334--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10275--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10275--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10275--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10334--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10334--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10275--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10275--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10335-by-pythonnut-on-???
==10335== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10335-by-pythonnut-on-???
==10335== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10335-by-pythonnut-on-???
==10335== 
==10335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10335== don't want to do, unless you know exactly what you're doing,
==10335== or are doing some strange experiment):
==10335==   /usr/lib/valgrind/../../bin/vgdb --pid=10335 ...command...
==10335== 
==10335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10335==   /path/to/gdb ./zsh
==10335== and then give GDB the following command
==10335==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10335
==10335== --pid is optional if only one valgrind process is running
==10335== 
--10335-- Caught __NR_exit; running __libc_freeres()
--10335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10335== 
==10335== HEAP SUMMARY:
==10335==     in use at exit: 3,123,818 bytes in 69,152 blocks
==10335==   total heap usage: 1,598,551 allocs, 1,529,399 frees, 129,123,000 bytes allocated
==10335== 
==10335== Searching for pointers to 69,152 not-freed blocks
--10335--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10335--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10335--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10335--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10335--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10335--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10335--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10335--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10335--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10335--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10335--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10335--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10335--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10335--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10335--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10335--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10335--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10335--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10335--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10335--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10335--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10335--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10335--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10335--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10335--   Scanning root segment: 0x701a000..0x701afff (4096)
--10335--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10335--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10335--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10335--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10335--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10335--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10335--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10335--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10335--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10335--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10275== Checked 4,816,400 bytes
==10275== 
==10334== Checked 4,790,344 bytes
==10334== 
==10275== LEAK SUMMARY:
==10275==    definitely lost: 2,221 bytes in 14 blocks
==10275==    indirectly lost: 6,796 bytes in 9 blocks
==10275==      possibly lost: 0 bytes in 0 blocks
==10275==    still reachable: 3,124,526 bytes in 69,379 blocks
==10275==         suppressed: 0 bytes in 0 blocks
==10275== Rerun with --leak-check=full to see details of leaked memory
==10275== 
==10275== Use --track-origins=yes to see where uninitialised values come from
==10275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10275== 
==10275== 1 errors in context 1 of 2:
==10275== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10275==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10275==    by 0x488CD0: stringsubst (subst.c:301)
==10275==    by 0x48801B: prefork (subst.c:77)
==10275==    by 0x42B318: execcmd (exec.c:2619)
==10275==    by 0x428CA0: execpline2 (exec.c:1697)
==10275==    by 0x427FD2: execpline (exec.c:1484)
==10275==    by 0x427756: execlist (exec.c:1267)
==10275==    by 0x42717C: execode (exec.c:1073)
==10275==    by 0x431299: runshfunc (exec.c:5040)
==10275==    by 0x430E76: doshfunc (exec.c:4920)
==10275==    by 0x4302FB: execshfunc (exec.c:4557)
==10275==    by 0x42D8C1: execcmd (exec.c:3373)
==10275== 
==10275== 
==10275== 2 errors in context 2 of 2:
==10275== Conditional jump or move depends on uninitialised value(s)
==10275==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10275==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10275==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10275==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10275==    by 0x42D8E9: execcmd (exec.c:3378)
==10275==    by 0x428CA0: execpline2 (exec.c:1697)
==10275==    by 0x427FD2: execpline (exec.c:1484)
==10275==    by 0x42779A: execlist (exec.c:1275)
==10275==    by 0x42717C: execode (exec.c:1073)
==10275==    by 0x431299: runshfunc (exec.c:5040)
==10275==    by 0x430E76: doshfunc (exec.c:4920)
==10275==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10275== 
==10275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== LEAK SUMMARY:
==10334==    definitely lost: 2,197 bytes in 13 blocks
==10334==    indirectly lost: 6,756 bytes in 7 blocks
==10334==      possibly lost: 0 bytes in 0 blocks
==10334==    still reachable: 3,106,227 bytes in 68,988 blocks
==10334==         suppressed: 0 bytes in 0 blocks
==10334== Rerun with --leak-check=full to see details of leaked memory
==10334== 
==10334== Use --track-origins=yes to see where uninitialised values come from
==10334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== 
==10334== 1 errors in context 1 of 2:
==10334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10334==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10334==    by 0x488CD0: stringsubst (subst.c:301)
==10334==    by 0x48801B: prefork (subst.c:77)
==10334==    by 0x42B318: execcmd (exec.c:2619)
==10334==    by 0x428CA0: execpline2 (exec.c:1697)
==10334==    by 0x427FD2: execpline (exec.c:1484)
==10334==    by 0x427756: execlist (exec.c:1267)
==10334==    by 0x42717C: execode (exec.c:1073)
==10334==    by 0x431299: runshfunc (exec.c:5040)
==10334==    by 0x430E76: doshfunc (exec.c:4920)
==10334==    by 0x4302FB: execshfunc (exec.c:4557)
==10334==    by 0x42D8C1: execcmd (exec.c:3373)
==10334== 
==10334== 
==10334== 2 errors in context 2 of 2:
==10334== Conditional jump or move depends on uninitialised value(s)
==10334==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10334==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10334==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10334==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10334==    by 0x42D8E9: execcmd (exec.c:3378)
==10334==    by 0x428CA0: execpline2 (exec.c:1697)
==10334==    by 0x427FD2: execpline (exec.c:1484)
==10334==    by 0x42779A: execlist (exec.c:1275)
==10334==    by 0x42717C: execode (exec.c:1073)
==10334==    by 0x431299: runshfunc (exec.c:5040)
==10334==    by 0x430E76: doshfunc (exec.c:4920)
==10334==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10334== 
==10334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10121-- Caught __NR_exit; running __libc_freeres()
==10336== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10336-by-pythonnut-on-???
==10336== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10336-by-pythonnut-on-???
==10336== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10336-by-pythonnut-on-???
==10336== 
==10336== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10336== don't want to do, unless you know exactly what you're doing,
==10336== or are doing some strange experiment):
==10336==   /usr/lib/valgrind/../../bin/vgdb --pid=10336 ...command...
==10336== 
==10336== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10336==   /path/to/gdb ./zsh
==10336== and then give GDB the following command
==10336==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10336
==10336== --pid is optional if only one valgrind process is running
==10336== 
--10336-- Caught __NR_exit; running __libc_freeres()
--10121-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10336-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10121== 
==10336== 
==10336== HEAP SUMMARY:
==10336==     in use at exit: 3,115,183 bytes in 69,008 blocks
==10336==   total heap usage: 1,598,215 allocs, 1,529,207 frees, 129,202,825 bytes allocated
==10336== 
==10121== HEAP SUMMARY:
==10121==     in use at exit: 3,131,268 bytes in 69,329 blocks
==10121==   total heap usage: 1,595,007 allocs, 1,525,678 frees, 128,911,905 bytes allocated
==10121== 
==10335== Checked 4,783,864 bytes
==10335== 
==10336== Searching for pointers to 69,008 not-freed blocks
--10336--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10336--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10336--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10336--   Scanning root segment: 0x4037000..0x403afff (16384)
--10336--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10336--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10336--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10336--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10336--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10336--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10336--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10336--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10336--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10336--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10336--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10336--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10336--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10336--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10336--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10336--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10336--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10336--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10336--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10336--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10336--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10336--   Scanning root segment: 0x701a000..0x701afff (4096)
--10336--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10336--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10336--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10336--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10336--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10336--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10336--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10336--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10336--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10336--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10121== Searching for pointers to 69,329 not-freed blocks
--10121--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10121--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10121--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10121--   Scanning root segment: 0x4037000..0x403afff (16384)
--10121--   Scanning root segment: 0x4049000..0x404cfff (16384)
==10335== LEAK SUMMARY:
==10335==    definitely lost: 2,197 bytes in 13 blocks
==10335==    indirectly lost: 6,756 bytes in 7 blocks
==10335==      possibly lost: 0 bytes in 0 blocks
==10335==    still reachable: 3,114,865 bytes in 69,132 blocks
==10335==         suppressed: 0 bytes in 0 blocks
==10335== Rerun with --leak-check=full to see details of leaked memory
==10335== 
==10335== Use --track-origins=yes to see where uninitialised values come from
==10335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10335== 
==10335== 1 errors in context 1 of 2:
==10335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10335==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10335==    by 0x488CD0: stringsubst (subst.c:301)
==10335==    by 0x48801B: prefork (subst.c:77)
--10121--   Scanning root segment: 0x4222000..0x4222fff (4096)
==10335==    by 0x42B318: execcmd (exec.c:2619)
==10335==    by 0x428CA0: execpline2 (exec.c:1697)
==10335==    by 0x427FD2: execpline (exec.c:1484)
==10335==    by 0x427756: execlist (exec.c:1267)
--10121--   Scanning root segment: 0x4223000..0x4223fff (4096)
==10335==    by 0x42717C: execode (exec.c:1073)
==10335==    by 0x431299: runshfunc (exec.c:5040)
==10335==    by 0x430E76: doshfunc (exec.c:4920)
==10335==    by 0x4302FB: execshfunc (exec.c:4557)
==10335==    by 0x42D8C1: execcmd (exec.c:3373)
==10335== 
--10121--   Scanning root segment: 0x4224000..0x4224fff (4096)
==10335== 
==10335== 2 errors in context 2 of 2:
==10335== Conditional jump or move depends on uninitialised value(s)
--10121--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
==10335==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10335==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10335==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
--10121--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==10335==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10335==    by 0x42D8E9: execcmd (exec.c:3378)
==10335==    by 0x428CA0: execpline2 (exec.c:1697)
==10335==    by 0x427FD2: execpline (exec.c:1484)
==10335==    by 0x42779A: execlist (exec.c:1275)
==10335==    by 0x42717C: execode (exec.c:1073)
==10335==    by 0x431299: runshfunc (exec.c:5040)
==10335==    by 0x430E76: doshfunc (exec.c:4920)
==10335==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10335== 
==10335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10121--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10121--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10121--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10121--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10121--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10121--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10121--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10121--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10121--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10121--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10121--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10121--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10121--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10121--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10121--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10121--   Scanning root segment: 0x701a000..0x701afff (4096)
--10121--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10121--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10121--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10121--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10121--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10121--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10121--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10121--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10121--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10121--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10338== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10338-by-pythonnut-on-???
==10338== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10338-by-pythonnut-on-???
==10338== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10338-by-pythonnut-on-???
==10338== 
==10338== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10338== don't want to do, unless you know exactly what you're doing,
==10338== or are doing some strange experiment):
==10338==   /usr/lib/valgrind/../../bin/vgdb --pid=10338 ...command...
==10338== 
==10338== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10338==   /path/to/gdb ./zsh
==10338== and then give GDB the following command
==10338==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10338
==10338== --pid is optional if only one valgrind process is running
==10338== 
--10338-- Caught __NR_exit; running __libc_freeres()
==10336== Checked 4,790,344 bytes
==10336== 
==10121== Checked 4,813,744 bytes
==10121== 
==10336== LEAK SUMMARY:
==10336==    definitely lost: 2,197 bytes in 13 blocks
==10336==    indirectly lost: 6,756 bytes in 7 blocks
==10336==      possibly lost: 0 bytes in 0 blocks
==10336==    still reachable: 3,106,230 bytes in 68,988 blocks
==10336==         suppressed: 0 bytes in 0 blocks
==10336== Rerun with --leak-check=full to see details of leaked memory
==10336== 
==10336== Use --track-origins=yes to see where uninitialised values come from
==10336== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10336== 
==10336== 1 errors in context 1 of 2:
==10336== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10336==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10336==    by 0x488CD0: stringsubst (subst.c:301)
==10336==    by 0x48801B: prefork (subst.c:77)
==10336==    by 0x42B318: execcmd (exec.c:2619)
==10336==    by 0x428CA0: execpline2 (exec.c:1697)
==10336==    by 0x427FD2: execpline (exec.c:1484)
==10336==    by 0x427756: execlist (exec.c:1267)
==10336==    by 0x42717C: execode (exec.c:1073)
==10336==    by 0x431299: runshfunc (exec.c:5040)
==10336==    by 0x430E76: doshfunc (exec.c:4920)
==10336==    by 0x4302FB: execshfunc (exec.c:4557)
==10336==    by 0x42D8C1: execcmd (exec.c:3373)
==10336== 
==10336== 
==10336== 2 errors in context 2 of 2:
==10336== Conditional jump or move depends on uninitialised value(s)
==10336==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10336==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10336==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10336==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10336==    by 0x42D8E9: execcmd (exec.c:3378)
==10336==    by 0x428CA0: execpline2 (exec.c:1697)
==10336==    by 0x427FD2: execpline (exec.c:1484)
==10336==    by 0x42779A: execlist (exec.c:1275)
==10336==    by 0x42717C: execode (exec.c:1073)
==10336==    by 0x431299: runshfunc (exec.c:5040)
==10336==    by 0x430E76: doshfunc (exec.c:4920)
==10336==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10336== 
==10336== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10338-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10121== LEAK SUMMARY:
==10121==    definitely lost: 2,221 bytes in 14 blocks
==10121==    indirectly lost: 6,796 bytes in 9 blocks
==10121==      possibly lost: 0 bytes in 0 blocks
==10121==    still reachable: 3,122,251 bytes in 69,306 blocks
==10121==         suppressed: 0 bytes in 0 blocks
==10121== Rerun with --leak-check=full to see details of leaked memory
==10121== 
==10121== Use --track-origins=yes to see where uninitialised values come from
==10121== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10121== 
==10121== 1 errors in context 1 of 2:
==10121== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10121==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10121==    by 0x488CD0: stringsubst (subst.c:301)
==10121==    by 0x48801B: prefork (subst.c:77)
==10121==    by 0x42B318: execcmd (exec.c:2619)
==10121==    by 0x428CA0: execpline2 (exec.c:1697)
==10121==    by 0x427FD2: execpline (exec.c:1484)
==10121==    by 0x427756: execlist (exec.c:1267)
==10121==    by 0x42717C: execode (exec.c:1073)
==10121==    by 0x431299: runshfunc (exec.c:5040)
==10121==    by 0x430E76: doshfunc (exec.c:4920)
==10121==    by 0x4302FB: execshfunc (exec.c:4557)
==10121==    by 0x42D8C1: execcmd (exec.c:3373)
==10121== 
==10121== 
==10121== 2 errors in context 2 of 2:
==10121== Conditional jump or move depends on uninitialised value(s)
==10121==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10121==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10121==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10121==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10121==    by 0x42D8E9: execcmd (exec.c:3378)
==10121==    by 0x428CA0: execpline2 (exec.c:1697)
==10121==    by 0x427FD2: execpline (exec.c:1484)
==10121==    by 0x42779A: execlist (exec.c:1275)
==10121==    by 0x42717C: execode (exec.c:1073)
==10121==    by 0x431299: runshfunc (exec.c:5040)
==10121==    by 0x430E76: doshfunc (exec.c:4920)
==10121==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10121== 
==10121== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10338== 
==10338== HEAP SUMMARY:
==10338==     in use at exit: 3,124,092 bytes in 69,158 blocks
==10338==   total heap usage: 1,599,076 allocs, 1,529,918 frees, 129,275,030 bytes allocated
==10338== 
==10339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10339-by-pythonnut-on-???
==10339== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10339-by-pythonnut-on-???
==10339== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10339-by-pythonnut-on-???
==10339== 
==10339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10339== don't want to do, unless you know exactly what you're doing,
==10339== or are doing some strange experiment):
==10339==   /usr/lib/valgrind/../../bin/vgdb --pid=10339 ...command...
==10339== 
==10339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10339==   /path/to/gdb ./zsh
==10339== and then give GDB the following command
==10339==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10339
==10339== --pid is optional if only one valgrind process is running
==10339== 
--10340-- Caught __NR_exit; running __libc_freeres()
==10340== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10340-by-pythonnut-on-???
==10340== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10340-by-pythonnut-on-???
==10340== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10340-by-pythonnut-on-???
==10340== 
==10340== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10340== don't want to do, unless you know exactly what you're doing,
==10340== or are doing some strange experiment):
==10340==   /usr/lib/valgrind/../../bin/vgdb --pid=10340 ...command...
==10340== 
==10340== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10340==   /path/to/gdb ./zsh
==10340== and then give GDB the following command
==10340==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10340
==10340== --pid is optional if only one valgrind process is running
==10340== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
==10338== Searching for pointers to 69,158 not-freed blocks
--10338--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10338--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10338--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10338--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10338--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10338--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10338--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10338--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10338--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10338--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10338--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10338--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10338--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10338--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10338--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10338--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10338--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10338--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10338--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10338--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10338--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10338--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10338--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10338--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10338--   Scanning root segment: 0x701a000..0x701afff (4096)
--10338--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10338--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10338--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10338--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10338--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10338--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10338--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10338--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10338--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10338--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10340-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10340== 
==10340== HEAP SUMMARY:
==10340==     in use at exit: 3,115,465 bytes in 69,013 blocks
==10340==   total heap usage: 1,598,221 allocs, 1,529,208 frees, 129,206,439 bytes allocated
==10340== 
==10340== Searching for pointers to 69,013 not-freed blocks
--10340--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10340--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10340--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10340--   Scanning root segment: 0x4037000..0x403afff (16384)
--10340--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10340--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10340--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10340--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10340--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10340--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10340--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10340--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10340--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10340--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10340--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10340--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10340--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10340--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10340--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10340--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10340--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10340--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10340--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10340--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10340--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10340--   Scanning root segment: 0x701a000..0x701afff (4096)
--10340--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10340--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10340--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10340--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10340--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10340--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10340--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10340--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10340--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10340--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10338== Checked 4,784,072 bytes
==10338== 
==10338== LEAK SUMMARY:
==10338==    definitely lost: 2,197 bytes in 13 blocks
==10338==    indirectly lost: 6,756 bytes in 7 blocks
==10338==      possibly lost: 0 bytes in 0 blocks
==10338==    still reachable: 3,115,139 bytes in 69,138 blocks
==10338==         suppressed: 0 bytes in 0 blocks
==10338== Rerun with --leak-check=full to see details of leaked memory
==10338== 
==10338== Use --track-origins=yes to see where uninitialised values come from
==10338== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10338== 
==10338== 1 errors in context 1 of 2:
==10338== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10338==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10338==    by 0x488CD0: stringsubst (subst.c:301)
==10338==    by 0x48801B: prefork (subst.c:77)
==10338==    by 0x42B318: execcmd (exec.c:2619)
==10338==    by 0x428CA0: execpline2 (exec.c:1697)
==10338==    by 0x427FD2: execpline (exec.c:1484)
==10338==    by 0x427756: execlist (exec.c:1267)
==10338==    by 0x42717C: execode (exec.c:1073)
==10338==    by 0x431299: runshfunc (exec.c:5040)
==10338==    by 0x430E76: doshfunc (exec.c:4920)
==10338==    by 0x4302FB: execshfunc (exec.c:4557)
==10338==    by 0x42D8C1: execcmd (exec.c:3373)
==10338== 
==10338== 
==10338== 2 errors in context 2 of 2:
==10338== Conditional jump or move depends on uninitialised value(s)
==10338==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10338==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10338==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10338==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10338==    by 0x42D8E9: execcmd (exec.c:3378)
==10338==    by 0x428CA0: execpline2 (exec.c:1697)
==10338==    by 0x427FD2: execpline (exec.c:1484)
==10338==    by 0x42779A: execlist (exec.c:1275)
==10338==    by 0x42717C: execode (exec.c:1073)
==10338==    by 0x431299: runshfunc (exec.c:5040)
==10338==    by 0x430E76: doshfunc (exec.c:4920)
==10338==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10338== 
==10338== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10342-- Caught __NR_exit; running __libc_freeres()
==10340== Checked 4,791,256 bytes
==10340== 
==10342== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10342-by-pythonnut-on-???
==10342== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10342-by-pythonnut-on-???
==10342== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10342-by-pythonnut-on-???
==10342== 
==10342== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10342== don't want to do, unless you know exactly what you're doing,
==10342== or are doing some strange experiment):
==10342==   /usr/lib/valgrind/../../bin/vgdb --pid=10342 ...command...
==10342== 
==10342== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10342==   /path/to/gdb ./zsh
==10342== and then give GDB the following command
==10342==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10342
==10342== --pid is optional if only one valgrind process is running
==10342== 
==10340== LEAK SUMMARY:
==10340==    definitely lost: 2,197 bytes in 13 blocks
==10340==    indirectly lost: 6,756 bytes in 7 blocks
==10340==      possibly lost: 0 bytes in 0 blocks
==10340==    still reachable: 3,106,512 bytes in 68,993 blocks
==10340==         suppressed: 0 bytes in 0 blocks
==10340== Rerun with --leak-check=full to see details of leaked memory
==10340== 
==10340== Use --track-origins=yes to see where uninitialised values come from
==10340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10340== 
==10340== 1 errors in context 1 of 2:
==10340== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10340==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10340==    by 0x488CD0: stringsubst (subst.c:301)
==10340==    by 0x48801B: prefork (subst.c:77)
==10340==    by 0x42B318: execcmd (exec.c:2619)
==10340==    by 0x428CA0: execpline2 (exec.c:1697)
==10340==    by 0x427FD2: execpline (exec.c:1484)
==10340==    by 0x427756: execlist (exec.c:1267)
==10340==    by 0x42717C: execode (exec.c:1073)
==10340==    by 0x431299: runshfunc (exec.c:5040)
==10340==    by 0x430E76: doshfunc (exec.c:4920)
==10340==    by 0x4302FB: execshfunc (exec.c:4557)
==10340==    by 0x42D8C1: execcmd (exec.c:3373)
==10340== 
==10340== 
==10340== 2 errors in context 2 of 2:
==10340== Conditional jump or move depends on uninitialised value(s)
==10340==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10340==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10340==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10340==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10340==    by 0x42D8E9: execcmd (exec.c:3378)
==10340==    by 0x428CA0: execpline2 (exec.c:1697)
==10340==    by 0x427FD2: execpline (exec.c:1484)
==10340==    by 0x42779A: execlist (exec.c:1275)
==10340==    by 0x42717C: execode (exec.c:1073)
==10340==    by 0x431299: runshfunc (exec.c:5040)
==10340==    by 0x430E76: doshfunc (exec.c:4920)
==10340==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10340== 
==10340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10342-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10339-- Caught __NR_exit; running __libc_freeres()
==10342== 
==10342== HEAP SUMMARY:
==10342==     in use at exit: 3,123,996 bytes in 69,158 blocks
==10342==   total heap usage: 1,599,056 allocs, 1,529,898 frees, 129,272,800 bytes allocated
==10342== 
--10339-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10342== Searching for pointers to 69,158 not-freed blocks
--10342--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10342--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10342--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10342--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10342--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10342--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10342--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10342--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10342--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10342--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10342--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10342--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10342--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10342--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10342--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10342--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10342--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10342--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10342--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10342--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10342--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10342--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10342--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10342--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10342--   Scanning root segment: 0x701a000..0x701afff (4096)
--10342--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10342--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10342--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10342--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10342--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10342--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10342--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10342--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10342--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10342--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10339== 
==10339== HEAP SUMMARY:
==10339==     in use at exit: 3,115,241 bytes in 69,010 blocks
==10339==   total heap usage: 1,598,224 allocs, 1,529,214 frees, 129,207,015 bytes allocated
==10339== 
==10339== Searching for pointers to 69,010 not-freed blocks
--10339--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10339--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10339--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10339--   Scanning root segment: 0x4037000..0x403afff (16384)
--10339--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10339--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10339--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10339--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10339--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10339--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10339--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10339--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10339--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10339--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10339--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10339--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10339--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10339--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10339--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10339--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10339--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10339--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10339--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10339--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10339--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10339--   Scanning root segment: 0x701a000..0x701afff (4096)
--10339--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10339--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10339--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10339--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10339--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10339--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10339--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10339--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10339--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10339--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10342== Checked 4,783,976 bytes
==10342== 
==10342== LEAK SUMMARY:
==10342==    definitely lost: 2,197 bytes in 13 blocks
==10342==    indirectly lost: 6,756 bytes in 7 blocks
==10342==      possibly lost: 0 bytes in 0 blocks
==10342==    still reachable: 3,115,043 bytes in 69,138 blocks
==10342==         suppressed: 0 bytes in 0 blocks
==10342== Rerun with --leak-check=full to see details of leaked memory
==10342== 
==10342== Use --track-origins=yes to see where uninitialised values come from
==10342== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10342== 
==10342== 1 errors in context 1 of 2:
==10342== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10342==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10342==    by 0x488CD0: stringsubst (subst.c:301)
==10342==    by 0x48801B: prefork (subst.c:77)
==10342==    by 0x42B318: execcmd (exec.c:2619)
==10342==    by 0x428CA0: execpline2 (exec.c:1697)
==10342==    by 0x427FD2: execpline (exec.c:1484)
==10342==    by 0x427756: execlist (exec.c:1267)
==10342==    by 0x42717C: execode (exec.c:1073)
==10342==    by 0x431299: runshfunc (exec.c:5040)
==10342==    by 0x430E76: doshfunc (exec.c:4920)
==10342==    by 0x4302FB: execshfunc (exec.c:4557)
==10342==    by 0x42D8C1: execcmd (exec.c:3373)
==10342== 
==10342== 
==10342== 2 errors in context 2 of 2:
==10342== Conditional jump or move depends on uninitialised value(s)
==10342==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10342==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10342==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10342==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10342==    by 0x42D8E9: execcmd (exec.c:3378)
==10342==    by 0x428CA0: execpline2 (exec.c:1697)
==10342==    by 0x427FD2: execpline (exec.c:1484)
==10342==    by 0x42779A: execlist (exec.c:1275)
==10342==    by 0x42717C: execode (exec.c:1073)
==10342==    by 0x431299: runshfunc (exec.c:5040)
==10342==    by 0x430E76: doshfunc (exec.c:4920)
==10342==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10342== 
==10342== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10339== Checked 4,790,400 bytes
==10339== 
==10345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10345-by-pythonnut-on-???
==10345== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10345-by-pythonnut-on-???
==10345== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10345-by-pythonnut-on-???
==10345== 
==10345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10345== don't want to do, unless you know exactly what you're doing,
==10345== or are doing some strange experiment):
==10345==   /usr/lib/valgrind/../../bin/vgdb --pid=10345 ...command...
==10345== 
==10345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10345==   /path/to/gdb ./zsh
==10345== and then give GDB the following command
==10345==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10345
==10345== --pid is optional if only one valgrind process is running
==10345== 
==10339== LEAK SUMMARY:
==10339==    definitely lost: 2,197 bytes in 13 blocks
==10339==    indirectly lost: 6,756 bytes in 7 blocks
==10339==      possibly lost: 0 bytes in 0 blocks
==10339==    still reachable: 3,106,288 bytes in 68,990 blocks
==10339==         suppressed: 0 bytes in 0 blocks
==10339== Rerun with --leak-check=full to see details of leaked memory
==10339== 
==10339== Use --track-origins=yes to see where uninitialised values come from
==10339== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10339== 
==10339== 1 errors in context 1 of 2:
==10339== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10339==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10339==    by 0x488CD0: stringsubst (subst.c:301)
==10339==    by 0x48801B: prefork (subst.c:77)
==10339==    by 0x42B318: execcmd (exec.c:2619)
==10339==    by 0x428CA0: execpline2 (exec.c:1697)
==10339==    by 0x427FD2: execpline (exec.c:1484)
==10339==    by 0x427756: execlist (exec.c:1267)
==10339==    by 0x42717C: execode (exec.c:1073)
==10339==    by 0x431299: runshfunc (exec.c:5040)
==10339==    by 0x430E76: doshfunc (exec.c:4920)
==10339==    by 0x4302FB: execshfunc (exec.c:4557)
==10339==    by 0x42D8C1: execcmd (exec.c:3373)
==10339== 
==10339== 
==10339== 2 errors in context 2 of 2:
==10339== Conditional jump or move depends on uninitialised value(s)
==10339==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10339==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10339==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10339==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10339==    by 0x42D8E9: execcmd (exec.c:3378)
==10339==    by 0x428CA0: execpline2 (exec.c:1697)
==10339==    by 0x427FD2: execpline (exec.c:1484)
==10339==    by 0x42779A: execlist (exec.c:1275)
==10339==    by 0x42717C: execode (exec.c:1073)
==10339==    by 0x431299: runshfunc (exec.c:5040)
==10339==    by 0x430E76: doshfunc (exec.c:4920)
==10339==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10339== 
==10339== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10345-- Caught __NR_exit; running __libc_freeres()
--10197-- Caught __NR_exit; running __libc_freeres()
--10345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10197-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10345== 
==10197== 
==10345== HEAP SUMMARY:
==10345==     in use at exit: 3,124,024 bytes in 69,159 blocks
==10345==   total heap usage: 1,599,069 allocs, 1,529,910 frees, 129,275,487 bytes allocated
==10345== 
==10197== HEAP SUMMARY:
==10197==     in use at exit: 3,112,747 bytes in 68,933 blocks
==10197==   total heap usage: 1,598,223 allocs, 1,529,290 frees, 129,208,805 bytes allocated
==10197== 
==10345== Searching for pointers to 69,159 not-freed blocks
--10345--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10345--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10345--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10345--   Scanning root segment: 0x4037000..0x403afff (16384)
--10345--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10345--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10345--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10345--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10345--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10345--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10345--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10345--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10345--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10345--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10345--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10345--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10345--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10345--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10345--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10345--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10345--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10345--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10345--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10345--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10345--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10345--   Scanning root segment: 0x701a000..0x701afff (4096)
--10345--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10345--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10345--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10345--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10345--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10345--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10345--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10345--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10345--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10345--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10197== Searching for pointers to 68,933 not-freed blocks
--10197--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10197--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10197--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10197--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10197--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10197--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10197--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10197--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10197--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10197--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10197--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10197--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10197--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10197--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10197--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10197--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10197--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10197--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10197--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10197--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10197--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10197--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10197--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10197--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10197--   Scanning root segment: 0x701a000..0x701afff (4096)
--10197--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10197--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10197--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10197--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10197--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10197--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10197--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10197--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10197--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10197--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10345== Checked 4,799,872 bytes
==10345== 
==10197== Checked 4,768,544 bytes
==10197== 
==10345== LEAK SUMMARY:
==10345==    definitely lost: 2,197 bytes in 13 blocks
==10345==    indirectly lost: 6,756 bytes in 7 blocks
==10345==      possibly lost: 0 bytes in 0 blocks
==10345==    still reachable: 3,115,071 bytes in 69,139 blocks
==10345==         suppressed: 0 bytes in 0 blocks
==10345== Rerun with --leak-check=full to see details of leaked memory
==10345== 
==10345== Use --track-origins=yes to see where uninitialised values come from
==10345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10345== 
==10345== 1 errors in context 1 of 2:
==10345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10345==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10345==    by 0x488CD0: stringsubst (subst.c:301)
==10345==    by 0x48801B: prefork (subst.c:77)
==10345==    by 0x42B318: execcmd (exec.c:2619)
==10345==    by 0x428CA0: execpline2 (exec.c:1697)
==10345==    by 0x427FD2: execpline (exec.c:1484)
==10345==    by 0x427756: execlist (exec.c:1267)
==10345==    by 0x42717C: execode (exec.c:1073)
==10345==    by 0x431299: runshfunc (exec.c:5040)
==10345==    by 0x430E76: doshfunc (exec.c:4920)
==10345==    by 0x4302FB: execshfunc (exec.c:4557)
==10345==    by 0x42D8C1: execcmd (exec.c:3373)
==10345== 
==10345== 
==10345== 2 errors in context 2 of 2:
==10345== Conditional jump or move depends on uninitialised value(s)
==10345==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10345==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10345==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10345==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10345==    by 0x42D8E9: execcmd (exec.c:3378)
==10345==    by 0x428CA0: execpline2 (exec.c:1697)
==10345==    by 0x427FD2: execpline (exec.c:1484)
==10345==    by 0x42779A: execlist (exec.c:1275)
==10345==    by 0x42717C: execode (exec.c:1073)
==10345==    by 0x431299: runshfunc (exec.c:5040)
==10345==    by 0x430E76: doshfunc (exec.c:4920)
==10345==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10345== 
==10345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== LEAK SUMMARY:
==10197==    definitely lost: 2,197 bytes in 13 blocks
==10197==    indirectly lost: 6,756 bytes in 7 blocks
==10197==      possibly lost: 0 bytes in 0 blocks
==10197==    still reachable: 3,103,794 bytes in 68,913 blocks
==10197==         suppressed: 0 bytes in 0 blocks
==10197== Rerun with --leak-check=full to see details of leaked memory
==10197== 
==10197== Use --track-origins=yes to see where uninitialised values come from
==10197== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== 
==10197== 1 errors in context 1 of 2:
==10197== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10197==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10197==    by 0x488CD0: stringsubst (subst.c:301)
==10197==    by 0x48801B: prefork (subst.c:77)
==10197==    by 0x42B318: execcmd (exec.c:2619)
==10197==    by 0x428CA0: execpline2 (exec.c:1697)
==10197==    by 0x427FD2: execpline (exec.c:1484)
==10197==    by 0x427756: execlist (exec.c:1267)
==10197==    by 0x42717C: execode (exec.c:1073)
==10197==    by 0x431299: runshfunc (exec.c:5040)
==10197==    by 0x430E76: doshfunc (exec.c:4920)
==10197==    by 0x4302FB: execshfunc (exec.c:4557)
==10197==    by 0x42D8C1: execcmd (exec.c:3373)
==10197== 
==10197== 
==10197== 2 errors in context 2 of 2:
==10197== Conditional jump or move depends on uninitialised value(s)
==10197==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10197==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10197==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10197==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10197==    by 0x42D8E9: execcmd (exec.c:3378)
==10197==    by 0x428CA0: execpline2 (exec.c:1697)
==10197==    by 0x427FD2: execpline (exec.c:1484)
==10197==    by 0x42779A: execlist (exec.c:1275)
==10197==    by 0x42717C: execode (exec.c:1073)
==10197==    by 0x431299: runshfunc (exec.c:5040)
==10197==    by 0x430E76: doshfunc (exec.c:4920)
==10197==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10197== 
==10197== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10346-by-pythonnut-on-???
==10346== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10346-by-pythonnut-on-???
==10346== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10346-by-pythonnut-on-???
==10346== 
==10346== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10346== don't want to do, unless you know exactly what you're doing,
==10346== or are doing some strange experiment):
==10346==   /usr/lib/valgrind/../../bin/vgdb --pid=10346 ...command...
==10346== 
==10346== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10346==   /path/to/gdb ./zsh
==10346== and then give GDB the following command
==10346==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10346
==10346== --pid is optional if only one valgrind process is running
==10346== 
==10348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10348-by-pythonnut-on-???
==10348== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10348-by-pythonnut-on-???
==10348== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10348-by-pythonnut-on-???
==10348== 
==10348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10348== don't want to do, unless you know exactly what you're doing,
==10348== or are doing some strange experiment):
==10348==   /usr/lib/valgrind/../../bin/vgdb --pid=10348 ...command...
==10348== 
==10348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10348==   /path/to/gdb ./zsh
==10348== and then give GDB the following command
==10348==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10348
==10348== --pid is optional if only one valgrind process is running
==10348== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==10347== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10347-by-pythonnut-on-???
==10347== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10347-by-pythonnut-on-???
==10347== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10347-by-pythonnut-on-???
==10347== 
==10347== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10347== don't want to do, unless you know exactly what you're doing,
==10347== or are doing some strange experiment):
==10347==   /usr/lib/valgrind/../../bin/vgdb --pid=10347 ...command...
==10347== 
==10347== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10347==   /path/to/gdb ./zsh
==10347== and then give GDB the following command
==10347==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10347
==10347== --pid is optional if only one valgrind process is running
==10347== 
--10347-- Caught __NR_exit; running __libc_freeres()
==10349== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10349-by-pythonnut-on-???
==10349== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10349-by-pythonnut-on-???
==10349== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10349-by-pythonnut-on-???
==10349== 
==10349== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10349== don't want to do, unless you know exactly what you're doing,
==10349== or are doing some strange experiment):
==10349==   /usr/lib/valgrind/../../bin/vgdb --pid=10349 ...command...
==10349== 
==10349== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10349==   /path/to/gdb ./zsh
==10349== and then give GDB the following command
==10349==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10349
==10349== --pid is optional if only one valgrind process is running
==10349== 
--10347-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10347== 
==10347== HEAP SUMMARY:
==10347==     in use at exit: 3,113,283 bytes in 68,945 blocks
==10347==   total heap usage: 1,598,050 allocs, 1,529,105 frees, 129,163,612 bytes allocated
==10347== 
--10350-- Caught __NR_exit; running __libc_freeres()
==10350== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10350-by-pythonnut-on-???
==10350== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10350-by-pythonnut-on-???
==10350== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10350-by-pythonnut-on-???
==10350== 
==10350== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10350== don't want to do, unless you know exactly what you're doing,
==10350== or are doing some strange experiment):
==10350==   /usr/lib/valgrind/../../bin/vgdb --pid=10350 ...command...
==10350== 
==10350== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10350==   /path/to/gdb ./zsh
==10350== and then give GDB the following command
==10350==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10350
==10350== --pid is optional if only one valgrind process is running
==10350== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==10347== Searching for pointers to 68,945 not-freed blocks
--10347--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10347--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10347--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10347--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10347--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10347--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10347--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10347--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10347--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10347--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10347--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10347--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10347--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10347--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10347--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10347--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10347--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10347--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10347--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10347--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10347--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10347--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10347--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10347--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10347--   Scanning root segment: 0x701a000..0x701afff (4096)
--10347--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10347--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10347--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10347--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10347--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10347--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10347--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10347--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10347--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10347--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10350-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10350== 
==10350== HEAP SUMMARY:
==10350==     in use at exit: 3,124,497 bytes in 69,171 blocks
==10350==   total heap usage: 1,600,742 allocs, 1,531,571 frees, 129,368,399 bytes allocated
==10350== 
==10350== Searching for pointers to 69,171 not-freed blocks
--10350--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10350--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10350--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10350--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10350--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10350--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10350--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10350--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10350--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10350--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10350--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10350--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10350--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10350--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10350--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10350--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10350--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10350--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10350--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10350--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10350--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10350--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10350--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10350--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10350--   Scanning root segment: 0x701a000..0x701afff (4096)
--10350--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10350--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10350--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10350--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10350--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10350--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10350--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10350--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10350--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10350--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10347== Checked 4,771,120 bytes
==10347== 
==10347== LEAK SUMMARY:
==10347==    definitely lost: 2,197 bytes in 13 blocks
==10347==    indirectly lost: 6,756 bytes in 7 blocks
==10347==      possibly lost: 0 bytes in 0 blocks
==10347==    still reachable: 3,104,330 bytes in 68,925 blocks
==10347==         suppressed: 0 bytes in 0 blocks
==10347== Rerun with --leak-check=full to see details of leaked memory
==10347== 
==10347== Use --track-origins=yes to see where uninitialised values come from
==10347== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10347== 
==10347== 1 errors in context 1 of 2:
==10347== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10347==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10347==    by 0x488CD0: stringsubst (subst.c:301)
==10347==    by 0x48801B: prefork (subst.c:77)
==10347==    by 0x42B318: execcmd (exec.c:2619)
==10347==    by 0x428CA0: execpline2 (exec.c:1697)
==10347==    by 0x427FD2: execpline (exec.c:1484)
==10347==    by 0x427756: execlist (exec.c:1267)
==10347==    by 0x42717C: execode (exec.c:1073)
==10347==    by 0x431299: runshfunc (exec.c:5040)
==10347==    by 0x430E76: doshfunc (exec.c:4920)
==10347==    by 0x4302FB: execshfunc (exec.c:4557)
==10347==    by 0x42D8C1: execcmd (exec.c:3373)
==10347== 
==10347== 
==10347== 2 errors in context 2 of 2:
==10347== Conditional jump or move depends on uninitialised value(s)
==10347==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10347==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10347==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10347==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10347==    by 0x42D8E9: execcmd (exec.c:3378)
==10347==    by 0x428CA0: execpline2 (exec.c:1697)
==10347==    by 0x427FD2: execpline (exec.c:1484)
==10347==    by 0x42779A: execlist (exec.c:1275)
==10347==    by 0x42717C: execode (exec.c:1073)
==10347==    by 0x431299: runshfunc (exec.c:5040)
==10347==    by 0x430E76: doshfunc (exec.c:4920)
==10347==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10347== 
==10347== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2AEC,  len 4
==10350== Checked 4,785,808 bytes
==10350== 
==10350== LEAK SUMMARY:
==10350==    definitely lost: 2,205 bytes in 14 blocks
==10350==    indirectly lost: 6,756 bytes in 7 blocks
==10350==      possibly lost: 0 bytes in 0 blocks
==10350==    still reachable: 3,115,536 bytes in 69,150 blocks
==10350==         suppressed: 0 bytes in 0 blocks
==10350== Rerun with --leak-check=full to see details of leaked memory
==10350== 
==10350== Use --track-origins=yes to see where uninitialised values come from
==10350== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10350== 
==10350== 1 errors in context 1 of 2:
==10350== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10350==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10350==    by 0x488CD0: stringsubst (subst.c:301)
==10350==    by 0x48801B: prefork (subst.c:77)
==10350==    by 0x42B318: execcmd (exec.c:2619)
==10350==    by 0x428CA0: execpline2 (exec.c:1697)
==10350==    by 0x427FD2: execpline (exec.c:1484)
==10350==    by 0x427756: execlist (exec.c:1267)
==10350==    by 0x42717C: execode (exec.c:1073)
==10350==    by 0x431299: runshfunc (exec.c:5040)
==10350==    by 0x430E76: doshfunc (exec.c:4920)
==10350==    by 0x4302FB: execshfunc (exec.c:4557)
==10350==    by 0x42D8C1: execcmd (exec.c:3373)
==10350== 
==10350== 
==10350== 2 errors in context 2 of 2:
==10350== Conditional jump or move depends on uninitialised value(s)
==10350==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10350==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10350==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10350==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10350==    by 0x42D8E9: execcmd (exec.c:3378)
==10350==    by 0x428CA0: execpline2 (exec.c:1697)
==10350==    by 0x427FD2: execpline (exec.c:1484)
==10350==    by 0x42779A: execlist (exec.c:1275)
==10350==    by 0x42717C: execode (exec.c:1073)
==10350==    by 0x431299: runshfunc (exec.c:5040)
==10350==    by 0x430E76: doshfunc (exec.c:4920)
==10350==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10350== 
==10350== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10349-- Caught __NR_exit; running __libc_freeres()
--10349-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10349== 
==10349== HEAP SUMMARY:
==10349==     in use at exit: 3,124,433 bytes in 69,168 blocks
==10349==   total heap usage: 1,600,740 allocs, 1,531,572 frees, 129,368,158 bytes allocated
==10349== 
--10352-- Caught __NR_exit; running __libc_freeres()
==10349== Searching for pointers to 69,168 not-freed blocks
--10349--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10349--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10349--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10349--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10349--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10349--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10349--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10349--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10349--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10349--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10349--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10349--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10349--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10349--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10349--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10349--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10349--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10349--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10349--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10349--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10349--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10349--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10349--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10349--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10349--   Scanning root segment: 0x701a000..0x701afff (4096)
--10349--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10349--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10349--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10349--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10349--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10349--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10349--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10349--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10349--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10349--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10352-by-pythonnut-on-???
==10352== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10352-by-pythonnut-on-???
==10352== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10352-by-pythonnut-on-???
==10352== 
==10352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10352== don't want to do, unless you know exactly what you're doing,
==10352== or are doing some strange experiment):
==10352==   /usr/lib/valgrind/../../bin/vgdb --pid=10352 ...command...
==10352== 
==10352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10352==   /path/to/gdb ./zsh
==10352== and then give GDB the following command
==10352==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10352
==10352== --pid is optional if only one valgrind process is running
==10352== 
--10352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10352== 
==10352== HEAP SUMMARY:
==10352==     in use at exit: 3,113,674 bytes in 68,953 blocks
==10352==   total heap usage: 1,598,066 allocs, 1,529,113 frees, 129,167,723 bytes allocated
==10352== 
==10352== Searching for pointers to 68,953 not-freed blocks
--10352--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10352--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10352--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10352--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10352--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10352--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10352--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10352--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10352--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10352--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10352--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10352--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10352--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10352--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10352--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10352--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10352--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10352--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10352--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10352--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10352--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10352--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10352--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10352--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10352--   Scanning root segment: 0x701a000..0x701afff (4096)
--10352--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10352--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10352--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10352--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10352--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10352--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10352--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10352--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10352--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10352--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10349== Checked 4,785,120 bytes
==10349== 
==10349== LEAK SUMMARY:
==10349==    definitely lost: 2,205 bytes in 14 blocks
==10349==    indirectly lost: 6,756 bytes in 7 blocks
==10349==      possibly lost: 0 bytes in 0 blocks
==10349==    still reachable: 3,115,472 bytes in 69,147 blocks
==10349==         suppressed: 0 bytes in 0 blocks
==10349== Rerun with --leak-check=full to see details of leaked memory
==10349== 
==10349== Use --track-origins=yes to see where uninitialised values come from
==10349== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10349== 
==10349== 1 errors in context 1 of 2:
==10349== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10349==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10349==    by 0x488CD0: stringsubst (subst.c:301)
==10349==    by 0x48801B: prefork (subst.c:77)
==10349==    by 0x42B318: execcmd (exec.c:2619)
==10349==    by 0x428CA0: execpline2 (exec.c:1697)
==10349==    by 0x427FD2: execpline (exec.c:1484)
==10349==    by 0x427756: execlist (exec.c:1267)
==10349==    by 0x42717C: execode (exec.c:1073)
==10349==    by 0x431299: runshfunc (exec.c:5040)
==10349==    by 0x430E76: doshfunc (exec.c:4920)
==10349==    by 0x4302FB: execshfunc (exec.c:4557)
==10349==    by 0x42D8C1: execcmd (exec.c:3373)
==10349== 
==10349== 
==10349== 2 errors in context 2 of 2:
==10349== Conditional jump or move depends on uninitialised value(s)
==10349==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10349==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10349==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10349==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10349==    by 0x42D8E9: execcmd (exec.c:3378)
==10349==    by 0x428CA0: execpline2 (exec.c:1697)
==10349==    by 0x427FD2: execpline (exec.c:1484)
==10349==    by 0x42779A: execlist (exec.c:1275)
==10349==    by 0x42717C: execode (exec.c:1073)
==10349==    by 0x431299: runshfunc (exec.c:5040)
==10349==    by 0x430E76: doshfunc (exec.c:4920)
==10349==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10349== 
==10349== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10400-- Caught __NR_exit; running __libc_freeres()
==10352== Checked 4,771,224 bytes
==10352== 
==10400== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10400-by-pythonnut-on-???
==10400== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10400-by-pythonnut-on-???
==10400== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10400-by-pythonnut-on-???
==10400== 
==10400== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10400== don't want to do, unless you know exactly what you're doing,
==10400== or are doing some strange experiment):
==10400==   /usr/lib/valgrind/../../bin/vgdb --pid=10400 ...command...
==10400== 
==10400== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10400==   /path/to/gdb ./zsh
==10400== and then give GDB the following command
==10400==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10400
==10400== --pid is optional if only one valgrind process is running
==10400== 
==10352== LEAK SUMMARY:
==10352==    definitely lost: 2,197 bytes in 13 blocks
==10352==    indirectly lost: 6,756 bytes in 7 blocks
==10352==      possibly lost: 0 bytes in 0 blocks
==10352==    still reachable: 3,104,721 bytes in 68,933 blocks
==10352==         suppressed: 0 bytes in 0 blocks
==10352== Rerun with --leak-check=full to see details of leaked memory
==10352== 
==10352== Use --track-origins=yes to see where uninitialised values come from
==10352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10352== 
==10352== 1 errors in context 1 of 2:
==10352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10352==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10352==    by 0x488CD0: stringsubst (subst.c:301)
==10352==    by 0x48801B: prefork (subst.c:77)
==10352==    by 0x42B318: execcmd (exec.c:2619)
==10352==    by 0x428CA0: execpline2 (exec.c:1697)
==10352==    by 0x427FD2: execpline (exec.c:1484)
==10352==    by 0x427756: execlist (exec.c:1267)
==10352==    by 0x42717C: execode (exec.c:1073)
==10352==    by 0x431299: runshfunc (exec.c:5040)
==10352==    by 0x430E76: doshfunc (exec.c:4920)
==10352==    by 0x4302FB: execshfunc (exec.c:4557)
==10352==    by 0x42D8C1: execcmd (exec.c:3373)
==10352== 
==10352== 
==10352== 2 errors in context 2 of 2:
==10352== Conditional jump or move depends on uninitialised value(s)
==10352==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10352==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10352==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10352==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10352==    by 0x42D8E9: execcmd (exec.c:3378)
==10352==    by 0x428CA0: execpline2 (exec.c:1697)
==10352==    by 0x427FD2: execpline (exec.c:1484)
==10352==    by 0x42779A: execlist (exec.c:1275)
==10352==    by 0x42717C: execode (exec.c:1073)
==10352==    by 0x431299: runshfunc (exec.c:5040)
==10352==    by 0x430E76: doshfunc (exec.c:4920)
==10352==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10352== 
==10352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10400-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10346-- Caught __NR_exit; running __libc_freeres()
==10400== 
==10400== HEAP SUMMARY:
==10400==     in use at exit: 3,124,440 bytes in 69,168 blocks
==10400==   total heap usage: 1,600,755 allocs, 1,531,587 frees, 129,373,156 bytes allocated
==10400== 
--10346-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10400== Searching for pointers to 69,168 not-freed blocks
--10400--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10400--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10400--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10400--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10400--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10400--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10400--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10400--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10400--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10400--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10400--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10400--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10400--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10400--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10400--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10400--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10400--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10400--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10400--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
==10346== 
--10400--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10400--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10400--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10400--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10400--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10400--   Scanning root segment: 0x701a000..0x701afff (4096)
--10400--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10400--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10400--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10400--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10400--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10400--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10400--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10400--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10400--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10400--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10346== HEAP SUMMARY:
==10346==     in use at exit: 3,112,812 bytes in 68,934 blocks
==10346==   total heap usage: 1,598,075 allocs, 1,529,141 frees, 129,169,726 bytes allocated
==10346== 
==10346== Searching for pointers to 68,934 not-freed blocks
--10346--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10346--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10346--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10346--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10346--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10346--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10346--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10346--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10346--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10346--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10346--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10346--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10346--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10346--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10346--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10346--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10346--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10346--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10346--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10346--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10346--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10346--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10346--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10346--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10346--   Scanning root segment: 0x701a000..0x701afff (4096)
--10346--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10346--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10346--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10346--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10346--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10346--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10346--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10346--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10346--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10346--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10400== Checked 4,785,256 bytes
==10400== 
==10400== LEAK SUMMARY:
==10400==    definitely lost: 2,205 bytes in 14 blocks
==10400==    indirectly lost: 6,756 bytes in 7 blocks
==10400==      possibly lost: 0 bytes in 0 blocks
==10400==    still reachable: 3,115,479 bytes in 69,147 blocks
==10400==         suppressed: 0 bytes in 0 blocks
==10400== Rerun with --leak-check=full to see details of leaked memory
==10400== 
==10400== Use --track-origins=yes to see where uninitialised values come from
==10400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10400== 
==10400== 1 errors in context 1 of 2:
==10400== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10400==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10400==    by 0x488CD0: stringsubst (subst.c:301)
==10400==    by 0x48801B: prefork (subst.c:77)
==10400==    by 0x42B318: execcmd (exec.c:2619)
==10400==    by 0x428CA0: execpline2 (exec.c:1697)
==10400==    by 0x427FD2: execpline (exec.c:1484)
==10400==    by 0x427756: execlist (exec.c:1267)
==10400==    by 0x42717C: execode (exec.c:1073)
==10400==    by 0x431299: runshfunc (exec.c:5040)
==10400==    by 0x430E76: doshfunc (exec.c:4920)
==10400==    by 0x4302FB: execshfunc (exec.c:4557)
==10400==    by 0x42D8C1: execcmd (exec.c:3373)
==10400== 
==10400== 
==10400== 2 errors in context 2 of 2:
==10400== Conditional jump or move depends on uninitialised value(s)
==10400==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10400==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10400==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10400==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10400==    by 0x42D8E9: execcmd (exec.c:3378)
==10400==    by 0x428CA0: execpline2 (exec.c:1697)
==10400==    by 0x427FD2: execpline (exec.c:1484)
==10400==    by 0x42779A: execlist (exec.c:1275)
==10400==    by 0x42717C: execode (exec.c:1073)
==10400==    by 0x431299: runshfunc (exec.c:5040)
==10400==    by 0x430E76: doshfunc (exec.c:4920)
==10400==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10400== 
==10400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== Checked 4,768,608 bytes
==10346== 
==10346== LEAK SUMMARY:
==10346==    definitely lost: 2,197 bytes in 13 blocks
==10346==    indirectly lost: 6,756 bytes in 7 blocks
==10346==      possibly lost: 0 bytes in 0 blocks
==10346==    still reachable: 3,103,859 bytes in 68,914 blocks
==10346==         suppressed: 0 bytes in 0 blocks
==10346== Rerun with --leak-check=full to see details of leaked memory
==10346== 
==10346== Use --track-origins=yes to see where uninitialised values come from
==10346== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== 
==10346== 1 errors in context 1 of 2:
==10346== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10346==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10346==    by 0x488CD0: stringsubst (subst.c:301)
==10346==    by 0x48801B: prefork (subst.c:77)
==10346==    by 0x42B318: execcmd (exec.c:2619)
==10346==    by 0x428CA0: execpline2 (exec.c:1697)
==10346==    by 0x427FD2: execpline (exec.c:1484)
==10346==    by 0x427756: execlist (exec.c:1267)
==10346==    by 0x42717C: execode (exec.c:1073)
==10346==    by 0x431299: runshfunc (exec.c:5040)
==10346==    by 0x430E76: doshfunc (exec.c:4920)
==10346==    by 0x4302FB: execshfunc (exec.c:4557)
==10346==    by 0x42D8C1: execcmd (exec.c:3373)
==10346== 
==10346== 
==10346== 2 errors in context 2 of 2:
==10346== Conditional jump or move depends on uninitialised value(s)
==10346==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10346==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10346==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10346==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10346==    by 0x42D8E9: execcmd (exec.c:3378)
==10346==    by 0x428CA0: execpline2 (exec.c:1697)
==10346==    by 0x427FD2: execpline (exec.c:1484)
==10346==    by 0x42779A: execlist (exec.c:1275)
==10346==    by 0x42717C: execode (exec.c:1073)
==10346==    by 0x431299: runshfunc (exec.c:5040)
==10346==    by 0x430E76: doshfunc (exec.c:4920)
==10346==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10346== 
==10346== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10403-- Caught __NR_exit; running __libc_freeres()
==10403== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10403-by-pythonnut-on-???
==10403== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10403-by-pythonnut-on-???
==10403== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10403-by-pythonnut-on-???
==10403== 
==10403== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10403== don't want to do, unless you know exactly what you're doing,
==10403== or are doing some strange experiment):
==10403==   /usr/lib/valgrind/../../bin/vgdb --pid=10403 ...command...
==10403== 
==10403== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10403==   /path/to/gdb ./zsh
==10403== and then give GDB the following command
==10403==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10403
==10403== --pid is optional if only one valgrind process is running
==10403== 
--10195-- Caught __NR_exit; running __libc_freeres()
--10403-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10403== 
==10403== HEAP SUMMARY:
==10403==     in use at exit: 3,124,536 bytes in 69,168 blocks
==10403==   total heap usage: 1,600,771 allocs, 1,531,603 frees, 129,377,943 bytes allocated
==10403== 
--10195-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10195== 
==10195== HEAP SUMMARY:
==10195==     in use at exit: 3,112,015 bytes in 68,921 blocks
==10195==   total heap usage: 1,598,109 allocs, 1,529,188 frees, 129,167,101 bytes allocated
==10195== 
==10403== Searching for pointers to 69,168 not-freed blocks
--10403--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10403--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10403--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10403--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10403--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10403--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10403--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10403--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10403--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10403--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10403--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10403--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10403--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10403--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10403--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10403--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10403--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10403--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10403--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10403--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10403--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10403--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10403--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10403--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10403--   Scanning root segment: 0x701a000..0x701afff (4096)
--10403--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10403--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10403--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10403--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10403--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10403--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10403--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10403--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10403--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10403--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10195== Searching for pointers to 68,921 not-freed blocks
--10195--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10195--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10195--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10195--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10195--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10195--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10195--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10195--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10195--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10195--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10195--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10195--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10195--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10195--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10195--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10195--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10195--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10195--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10195--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10195--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10195--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10195--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10195--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10195--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10195--   Scanning root segment: 0x701a000..0x701afff (4096)
--10195--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10195--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10195--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10195--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10195--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10195--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10195--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10195--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10195--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10195--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10403== Checked 4,784,536 bytes
==10403== 
==10403== LEAK SUMMARY:
==10403==    definitely lost: 2,205 bytes in 14 blocks
==10403==    indirectly lost: 6,756 bytes in 7 blocks
==10403==      possibly lost: 0 bytes in 0 blocks
==10403==    still reachable: 3,115,575 bytes in 69,147 blocks
==10403==         suppressed: 0 bytes in 0 blocks
==10403== Rerun with --leak-check=full to see details of leaked memory
==10403== 
==10403== Use --track-origins=yes to see where uninitialised values come from
==10403== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10403== 
==10403== 1 errors in context 1 of 2:
==10403== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10403==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10403==    by 0x488CD0: stringsubst (subst.c:301)
==10403==    by 0x48801B: prefork (subst.c:77)
==10403==    by 0x42B318: execcmd (exec.c:2619)
==10403==    by 0x428CA0: execpline2 (exec.c:1697)
==10403==    by 0x427FD2: execpline (exec.c:1484)
==10403==    by 0x427756: execlist (exec.c:1267)
==10403==    by 0x42717C: execode (exec.c:1073)
==10403==    by 0x431299: runshfunc (exec.c:5040)
==10403==    by 0x430E76: doshfunc (exec.c:4920)
==10403==    by 0x4302FB: execshfunc (exec.c:4557)
==10403==    by 0x42D8C1: execcmd (exec.c:3373)
==10403== 
==10403== 
==10403== 2 errors in context 2 of 2:
==10403== Conditional jump or move depends on uninitialised value(s)
==10403==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10403==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10403==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10403==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10403==    by 0x42D8E9: execcmd (exec.c:3378)
==10403==    by 0x428CA0: execpline2 (exec.c:1697)
==10403==    by 0x427FD2: execpline (exec.c:1484)
==10403==    by 0x42779A: execlist (exec.c:1275)
==10403==    by 0x42717C: execode (exec.c:1073)
==10403==    by 0x431299: runshfunc (exec.c:5040)
==10403==    by 0x430E76: doshfunc (exec.c:4920)
==10403==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10403== 
==10403== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10195== Checked 4,767,168 bytes
==10195== 
==10195== LEAK SUMMARY:
==10195==    definitely lost: 2,197 bytes in 13 blocks
==10195==    indirectly lost: 6,756 bytes in 7 blocks
==10195==      possibly lost: 0 bytes in 0 blocks
==10195==    still reachable: 3,103,062 bytes in 68,901 blocks
==10195==         suppressed: 0 bytes in 0 blocks
==10195== Rerun with --leak-check=full to see details of leaked memory
==10195== 
==10195== Use --track-origins=yes to see where uninitialised values come from
==10195== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10195== 
==10195== 1 errors in context 1 of 2:
==10195== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10195==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10195==    by 0x488CD0: stringsubst (subst.c:301)
==10195==    by 0x48801B: prefork (subst.c:77)
==10195==    by 0x42B318: execcmd (exec.c:2619)
==10195==    by 0x428CA0: execpline2 (exec.c:1697)
==10195==    by 0x427FD2: execpline (exec.c:1484)
==10195==    by 0x427756: execlist (exec.c:1267)
==10195==    by 0x42717C: execode (exec.c:1073)
==10195==    by 0x431299: runshfunc (exec.c:5040)
==10195==    by 0x430E76: doshfunc (exec.c:4920)
==10195==    by 0x4302FB: execshfunc (exec.c:4557)
==10195==    by 0x42D8C1: execcmd (exec.c:3373)
==10195== 
==10195== 
==10195== 2 errors in context 2 of 2:
==10195== Conditional jump or move depends on uninitialised value(s)
==10195==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10195==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10195==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10195==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10195==    by 0x42D8E9: execcmd (exec.c:3378)
==10195==    by 0x428CA0: execpline2 (exec.c:1697)
==10195==    by 0x427FD2: execpline (exec.c:1484)
==10195==    by 0x42779A: execlist (exec.c:1275)
==10195==    by 0x42717C: execode (exec.c:1073)
==10195==    by 0x431299: runshfunc (exec.c:5040)
==10195==    by 0x430E76: doshfunc (exec.c:4920)
==10195==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10195== 
==10195== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10405== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10405-by-pythonnut-on-???
==10405== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10405-by-pythonnut-on-???
==10405== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10405-by-pythonnut-on-???
==10405== 
==10405== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10405== don't want to do, unless you know exactly what you're doing,
==10405== or are doing some strange experiment):
==10405==   /usr/lib/valgrind/../../bin/vgdb --pid=10405 ...command...
==10405== 
==10405== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10405==   /path/to/gdb ./zsh
==10405== and then give GDB the following command
==10405==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10405
==10405== --pid is optional if only one valgrind process is running
==10405== 
--10405-- Caught __NR_exit; running __libc_freeres()
--10405-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10405== 
==10405== HEAP SUMMARY:
==10405==     in use at exit: 3,124,814 bytes in 69,174 blocks
==10405==   total heap usage: 1,601,296 allocs, 1,532,122 frees, 129,529,981 bytes allocated
==10405== 
==10405== Searching for pointers to 69,174 not-freed blocks
--10405--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10405--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10405--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10405--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10405--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10405--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10405--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10405--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10405--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10405--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10405--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10405--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10405--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10405--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10405--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10405--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10405--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10405--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10405--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10405--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10405--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10405--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10405--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10405--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10405--   Scanning root segment: 0x701a000..0x701afff (4096)
--10405--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10405--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10405--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10405--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10405--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10405--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10405--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10405--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10405--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10405--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10405== Checked 4,784,728 bytes
==10405== 
==10405== LEAK SUMMARY:
==10405==    definitely lost: 2,205 bytes in 14 blocks
==10405==    indirectly lost: 6,756 bytes in 7 blocks
==10405==      possibly lost: 0 bytes in 0 blocks
==10405==    still reachable: 3,115,853 bytes in 69,153 blocks
==10405==         suppressed: 0 bytes in 0 blocks
==10405== Rerun with --leak-check=full to see details of leaked memory
==10405== 
==10405== Use --track-origins=yes to see where uninitialised values come from
==10405== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10405== 
==10405== 1 errors in context 1 of 2:
==10405== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10405==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10405==    by 0x488CD0: stringsubst (subst.c:301)
==10405==    by 0x48801B: prefork (subst.c:77)
==10405==    by 0x42B318: execcmd (exec.c:2619)
==10405==    by 0x428CA0: execpline2 (exec.c:1697)
==10405==    by 0x427FD2: execpline (exec.c:1484)
==10405==    by 0x427756: execlist (exec.c:1267)
==10405==    by 0x42717C: execode (exec.c:1073)
==10405==    by 0x431299: runshfunc (exec.c:5040)
==10405==    by 0x430E76: doshfunc (exec.c:4920)
==10405==    by 0x4302FB: execshfunc (exec.c:4557)
==10405==    by 0x42D8C1: execcmd (exec.c:3373)
==10405== 
==10405== 
==10405== 2 errors in context 2 of 2:
==10405== Conditional jump or move depends on uninitialised value(s)
==10405==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10405==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10405==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10405==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10405==    by 0x42D8E9: execcmd (exec.c:3378)
==10405==    by 0x428CA0: execpline2 (exec.c:1697)
==10405==    by 0x427FD2: execpline (exec.c:1484)
==10405==    by 0x42779A: execlist (exec.c:1275)
==10405==    by 0x42717C: execode (exec.c:1073)
==10405==    by 0x431299: runshfunc (exec.c:5040)
==10405==    by 0x430E76: doshfunc (exec.c:4920)
==10405==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10405== 
==10405== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10406-- Caught __NR_exit; running __libc_freeres()
==10406== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10406-by-pythonnut-on-???
==10406== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10406-by-pythonnut-on-???
==10406== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10406-by-pythonnut-on-???
==10406== 
==10406== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10406== don't want to do, unless you know exactly what you're doing,
==10406== or are doing some strange experiment):
==10406==   /usr/lib/valgrind/../../bin/vgdb --pid=10406 ...command...
==10406== 
==10406== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10406==   /path/to/gdb ./zsh
==10406== and then give GDB the following command
==10406==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10406
==10406== --pid is optional if only one valgrind process is running
==10406== 
--10406-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10406== 
==10406== HEAP SUMMARY:
==10406==     in use at exit: 3,124,718 bytes in 69,174 blocks
==10406==   total heap usage: 1,601,276 allocs, 1,532,102 frees, 129,527,751 bytes allocated
==10406== 
==10406== Searching for pointers to 69,174 not-freed blocks
--10406--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10406--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10406--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10406--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10406--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10406--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10406--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10406--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10406--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10406--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10406--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10406--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10406--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10406--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10406--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10406--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10406--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10406--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10406--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10406--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10406--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10406--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10406--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10406--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10406--   Scanning root segment: 0x701a000..0x701afff (4096)
--10406--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10406--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10406--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10406--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10406--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10406--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10406--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10406--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10406--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10406--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10406== Checked 4,784,632 bytes
==10406== 
==10406== LEAK SUMMARY:
==10406==    definitely lost: 2,205 bytes in 14 blocks
==10406==    indirectly lost: 6,756 bytes in 7 blocks
==10406==      possibly lost: 0 bytes in 0 blocks
==10406==    still reachable: 3,115,757 bytes in 69,153 blocks
==10406==         suppressed: 0 bytes in 0 blocks
==10406== Rerun with --leak-check=full to see details of leaked memory
==10406== 
==10406== Use --track-origins=yes to see where uninitialised values come from
==10406== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10406== 
==10406== 1 errors in context 1 of 2:
==10406== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10406==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10406==    by 0x488CD0: stringsubst (subst.c:301)
==10406==    by 0x48801B: prefork (subst.c:77)
==10406==    by 0x42B318: execcmd (exec.c:2619)
==10406==    by 0x428CA0: execpline2 (exec.c:1697)
==10406==    by 0x427FD2: execpline (exec.c:1484)
==10406==    by 0x427756: execlist (exec.c:1267)
==10406==    by 0x42717C: execode (exec.c:1073)
==10406==    by 0x431299: runshfunc (exec.c:5040)
==10406==    by 0x430E76: doshfunc (exec.c:4920)
==10406==    by 0x4302FB: execshfunc (exec.c:4557)
==10406==    by 0x42D8C1: execcmd (exec.c:3373)
==10406== 
==10406== 
==10406== 2 errors in context 2 of 2:
==10406== Conditional jump or move depends on uninitialised value(s)
==10406==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10406==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10406==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10406==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10406==    by 0x42D8E9: execcmd (exec.c:3378)
==10406==    by 0x428CA0: execpline2 (exec.c:1697)
==10406==    by 0x427FD2: execpline (exec.c:1484)
==10406==    by 0x42779A: execlist (exec.c:1275)
==10406==    by 0x42717C: execode (exec.c:1073)
==10406==    by 0x431299: runshfunc (exec.c:5040)
==10406==    by 0x430E76: doshfunc (exec.c:4920)
==10406==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10406== 
==10406== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10407-by-pythonnut-on-???
==10407== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10407-by-pythonnut-on-???
==10407== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10407-by-pythonnut-on-???
==10407== 
==10407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10407== don't want to do, unless you know exactly what you're doing,
==10407== or are doing some strange experiment):
==10407==   /usr/lib/valgrind/../../bin/vgdb --pid=10407 ...command...
==10407== 
==10407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10407==   /path/to/gdb ./zsh
==10407== and then give GDB the following command
==10407==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10407
==10407== --pid is optional if only one valgrind process is running
==10407== 
--10407-- Caught __NR_exit; running __libc_freeres()
--10407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10407== 
==10407== HEAP SUMMARY:
==10407==     in use at exit: 3,124,746 bytes in 69,175 blocks
==10407==   total heap usage: 1,601,289 allocs, 1,532,114 frees, 129,530,438 bytes allocated
==10407== 
==10407== Searching for pointers to 69,175 not-freed blocks
--10407--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10407--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10407--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10407--   Scanning root segment: 0x4037000..0x403afff (16384)
--10407--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10407--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10407--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10407--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10407--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10407--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10407--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10407--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10407--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10407--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10407--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10407--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10407--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10407--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10407--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10407--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10407--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10407--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10407--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10407--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10407--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10407--   Scanning root segment: 0x701a000..0x701afff (4096)
--10407--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10407--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10407--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10407--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10407--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10407--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10407--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10407--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10407--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10407--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10407== Checked 4,800,528 bytes
==10407== 
==10407== LEAK SUMMARY:
==10407==    definitely lost: 2,205 bytes in 14 blocks
==10407==    indirectly lost: 6,756 bytes in 7 blocks
==10407==      possibly lost: 0 bytes in 0 blocks
==10407==    still reachable: 3,115,785 bytes in 69,154 blocks
==10407==         suppressed: 0 bytes in 0 blocks
==10407== Rerun with --leak-check=full to see details of leaked memory
==10407== 
==10407== Use --track-origins=yes to see where uninitialised values come from
==10407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10407== 
==10407== 1 errors in context 1 of 2:
==10407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10407==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10407==    by 0x488CD0: stringsubst (subst.c:301)
==10407==    by 0x48801B: prefork (subst.c:77)
==10407==    by 0x42B318: execcmd (exec.c:2619)
==10407==    by 0x428CA0: execpline2 (exec.c:1697)
==10407==    by 0x427FD2: execpline (exec.c:1484)
==10407==    by 0x427756: execlist (exec.c:1267)
==10407==    by 0x42717C: execode (exec.c:1073)
==10407==    by 0x431299: runshfunc (exec.c:5040)
==10407==    by 0x430E76: doshfunc (exec.c:4920)
==10407==    by 0x4302FB: execshfunc (exec.c:4557)
==10407==    by 0x42D8C1: execcmd (exec.c:3373)
==10407== 
==10407== 
==10407== 2 errors in context 2 of 2:
==10407== Conditional jump or move depends on uninitialised value(s)
==10407==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10407==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10407==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10407==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10407==    by 0x42D8E9: execcmd (exec.c:3378)
==10407==    by 0x428CA0: execpline2 (exec.c:1697)
==10407==    by 0x427FD2: execpline (exec.c:1484)
==10407==    by 0x42779A: execlist (exec.c:1275)
==10407==    by 0x42717C: execode (exec.c:1073)
==10407==    by 0x431299: runshfunc (exec.c:5040)
==10407==    by 0x430E76: doshfunc (exec.c:4920)
==10407==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10407== 
==10407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10408-- Caught __NR_exit; running __libc_freeres()
==10408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10408-by-pythonnut-on-???
==10408== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10408-by-pythonnut-on-???
==10408== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10408-by-pythonnut-on-???
==10408== 
==10408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10408== don't want to do, unless you know exactly what you're doing,
==10408== or are doing some strange experiment):
==10408==   /usr/lib/valgrind/../../bin/vgdb --pid=10408 ...command...
==10408== 
==10408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10408==   /path/to/gdb ./zsh
==10408== and then give GDB the following command
==10408==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10408
==10408== --pid is optional if only one valgrind process is running
==10408== 
--10408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10408== 
==10408== HEAP SUMMARY:
==10408==     in use at exit: 3,123,940 bytes in 69,176 blocks
==10408==   total heap usage: 1,602,617 allocs, 1,533,441 frees, 129,603,071 bytes allocated
==10408== 
==10408== Searching for pointers to 69,176 not-freed blocks
--10408--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10408--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10408--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10408--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10408--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10408--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10408--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10408--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10408--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10408--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10408--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10408--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10408--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10408--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10408--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10408--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10408--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10408--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10408--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10408--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10408--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10408--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10408--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10408--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10408--   Scanning root segment: 0x701a000..0x701afff (4096)
--10408--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10408--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10408--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10408--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10408--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10408--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10408--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10408--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10408--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10408--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10408== Checked 4,786,024 bytes
==10408== 
==10408== LEAK SUMMARY:
==10408==    definitely lost: 2,205 bytes in 14 blocks
==10408==    indirectly lost: 6,756 bytes in 7 blocks
==10408==      possibly lost: 0 bytes in 0 blocks
==10408==    still reachable: 3,114,979 bytes in 69,155 blocks
==10408==         suppressed: 0 bytes in 0 blocks
==10408== Rerun with --leak-check=full to see details of leaked memory
==10408== 
==10408== Use --track-origins=yes to see where uninitialised values come from
==10408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10408== 
==10408== 1 errors in context 1 of 2:
==10408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10408==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10408==    by 0x488CD0: stringsubst (subst.c:301)
==10408==    by 0x48801B: prefork (subst.c:77)
==10408==    by 0x42B318: execcmd (exec.c:2619)
==10408==    by 0x428CA0: execpline2 (exec.c:1697)
==10408==    by 0x427FD2: execpline (exec.c:1484)
==10408==    by 0x427756: execlist (exec.c:1267)
==10408==    by 0x42717C: execode (exec.c:1073)
==10408==    by 0x431299: runshfunc (exec.c:5040)
==10408==    by 0x430E76: doshfunc (exec.c:4920)
==10408==    by 0x4302FB: execshfunc (exec.c:4557)
==10408==    by 0x42D8C1: execcmd (exec.c:3373)
==10408== 
==10408== 
==10408== 2 errors in context 2 of 2:
==10408== Conditional jump or move depends on uninitialised value(s)
==10408==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10408==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10408==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10408==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10408==    by 0x42D8E9: execcmd (exec.c:3378)
==10408==    by 0x428CA0: execpline2 (exec.c:1697)
==10408==    by 0x427FD2: execpline (exec.c:1484)
==10408==    by 0x42779A: execlist (exec.c:1275)
==10408==    by 0x42717C: execode (exec.c:1073)
==10408==    by 0x431299: runshfunc (exec.c:5040)
==10408==    by 0x430E76: doshfunc (exec.c:4920)
==10408==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10408== 
==10408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10411-by-pythonnut-on-???
==10411== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10411-by-pythonnut-on-???
==10411== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10411-by-pythonnut-on-???
==10411== 
==10411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10411== don't want to do, unless you know exactly what you're doing,
==10411== or are doing some strange experiment):
==10411==   /usr/lib/valgrind/../../bin/vgdb --pid=10411 ...command...
==10411== 
==10411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10411==   /path/to/gdb ./zsh
==10411== and then give GDB the following command
==10411==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10411
==10411== --pid is optional if only one valgrind process is running
==10411== 
==10412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10412-by-pythonnut-on-???
==10412== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10412-by-pythonnut-on-???
==10412== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10412-by-pythonnut-on-???
==10412== 
==10412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10412== don't want to do, unless you know exactly what you're doing,
==10412== or are doing some strange experiment):
==10412==   /usr/lib/valgrind/../../bin/vgdb --pid=10412 ...command...
==10412== 
==10412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10412==   /path/to/gdb ./zsh
==10412== and then give GDB the following command
==10412==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10412
==10412== --pid is optional if only one valgrind process is running
==10412== 
==10414== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10414-by-pythonnut-on-???
==10414== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10414-by-pythonnut-on-???
==10414== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10414-by-pythonnut-on-???
==10414== 
==10414== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10414== don't want to do, unless you know exactly what you're doing,
==10414== or are doing some strange experiment):
==10414==   /usr/lib/valgrind/../../bin/vgdb --pid=10414 ...command...
==10414== 
==10414== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10414==   /path/to/gdb ./zsh
==10414== and then give GDB the following command
==10414==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10414
==10414== --pid is optional if only one valgrind process is running
==10414== 
--10413-- Caught __NR_exit; running __libc_freeres()
==10416== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10416-by-pythonnut-on-???
==10416== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10416-by-pythonnut-on-???
==10416== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10416-by-pythonnut-on-???
==10416== 
==10416== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10416== don't want to do, unless you know exactly what you're doing,
==10416== or are doing some strange experiment):
==10416==   /usr/lib/valgrind/../../bin/vgdb --pid=10416 ...command...
==10416== 
==10416== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10416==   /path/to/gdb ./zsh
==10416== and then give GDB the following command
==10416==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10416
==10416== --pid is optional if only one valgrind process is running
==10416== 
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==10415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10415-by-pythonnut-on-???
==10415== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10415-by-pythonnut-on-???
==10415== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10415-by-pythonnut-on-???
==10415== 
==10415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10415== don't want to do, unless you know exactly what you're doing,
==10415== or are doing some strange experiment):
==10415==   /usr/lib/valgrind/../../bin/vgdb --pid=10415 ...command...
==10415== 
==10415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10415==   /path/to/gdb ./zsh
==10415== and then give GDB the following command
==10415==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10415
==10415== --pid is optional if only one valgrind process is running
==10415== 
==10413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10413-by-pythonnut-on-???
==10413== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10413-by-pythonnut-on-???
==10413== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10413-by-pythonnut-on-???
==10413== 
==10413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10413== don't want to do, unless you know exactly what you're doing,
==10413== or are doing some strange experiment):
==10413==   /usr/lib/valgrind/../../bin/vgdb --pid=10413 ...command...
==10413== 
==10413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10413==   /path/to/gdb ./zsh
==10413== and then give GDB the following command
==10413==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10413
==10413== --pid is optional if only one valgrind process is running
==10413== 
==10417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10417-by-pythonnut-on-???
==10417== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10417-by-pythonnut-on-???
==10417== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10417-by-pythonnut-on-???
==10417== 
==10417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10417== don't want to do, unless you know exactly what you're doing,
==10417== or are doing some strange experiment):
==10417==   /usr/lib/valgrind/../../bin/vgdb --pid=10417 ...command...
==10417== 
==10417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10417==   /path/to/gdb ./zsh
==10417== and then give GDB the following command
==10417==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10417
==10417== --pid is optional if only one valgrind process is running
==10417== 
--10413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10413== 
client request: code 4d430005,  addr 0xFFEFE66FC,  len 4
==10413== HEAP SUMMARY:
==10413==     in use at exit: 3,112,137 bytes in 68,933 blocks
==10413==   total heap usage: 1,602,939 allocs, 1,534,006 frees, 129,625,346 bytes allocated
==10413== 
--10417-- Caught __NR_exit; running __libc_freeres()
==10413== Searching for pointers to 68,933 not-freed blocks
--10413--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10413--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10413--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10413--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10413--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10413--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10413--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10413--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10413--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10413--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10413--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10413--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10413--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10413--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10413--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10413--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10413--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10413--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10413--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10413--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10413--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10413--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10413--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10413--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10413--   Scanning root segment: 0x701a000..0x701afff (4096)
--10413--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10413--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10413--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10413--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10413--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10413--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10413--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10413--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10413--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10413--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10417== 
==10417== HEAP SUMMARY:
==10417==     in use at exit: 3,137,594 bytes in 69,547 blocks
==10417==   total heap usage: 1,597,403 allocs, 1,527,856 frees, 129,042,259 bytes allocated
==10417== 
==10417== Searching for pointers to 69,547 not-freed blocks
--10417--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10417--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10417--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10417--   Scanning root segment: 0x4037000..0x403efff (32768)
--10417--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10417--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10417--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10417--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10417--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10417--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10417--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10417--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10417--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10417--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10417--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10417--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10417--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10417--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10417--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10417--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10417--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10417--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10417--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10417--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10417--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10417--   Scanning root segment: 0x701a000..0x701afff (4096)
--10417--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10417--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10417--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10417--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10417--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10417--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10417--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10417--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10417--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10417--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10413== Checked 4,768,320 bytes
==10413== 
==10413== LEAK SUMMARY:
==10413==    definitely lost: 2,205 bytes in 14 blocks
==10413==    indirectly lost: 6,756 bytes in 7 blocks
==10413==      possibly lost: 0 bytes in 0 blocks
==10413==    still reachable: 3,103,176 bytes in 68,912 blocks
==10413==         suppressed: 0 bytes in 0 blocks
==10413== Rerun with --leak-check=full to see details of leaked memory
==10413== 
==10413== Use --track-origins=yes to see where uninitialised values come from
==10413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10413== 
==10413== 1 errors in context 1 of 2:
==10413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10413==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10413==    by 0x488CD0: stringsubst (subst.c:301)
==10413==    by 0x48801B: prefork (subst.c:77)
==10413==    by 0x42B318: execcmd (exec.c:2619)
==10413==    by 0x428CA0: execpline2 (exec.c:1697)
==10413==    by 0x427FD2: execpline (exec.c:1484)
==10413==    by 0x427756: execlist (exec.c:1267)
==10413==    by 0x42717C: execode (exec.c:1073)
==10413==    by 0x431299: runshfunc (exec.c:5040)
==10413==    by 0x430E76: doshfunc (exec.c:4920)
==10413==    by 0x4302FB: execshfunc (exec.c:4557)
==10413==    by 0x42D8C1: execcmd (exec.c:3373)
==10413== 
==10413== 
==10413== 2 errors in context 2 of 2:
==10413== Conditional jump or move depends on uninitialised value(s)
==10413==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10413==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10413==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10413==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10413==    by 0x42D8E9: execcmd (exec.c:3378)
==10413==    by 0x428CA0: execpline2 (exec.c:1697)
==10413==    by 0x427FD2: execpline (exec.c:1484)
==10413==    by 0x42779A: execlist (exec.c:1275)
==10413==    by 0x42717C: execode (exec.c:1073)
==10413==    by 0x431299: runshfunc (exec.c:5040)
==10413==    by 0x430E76: doshfunc (exec.c:4920)
==10413==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10413== 
==10413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10411-- Caught __NR_exit; running __libc_freeres()
==10417== Checked 4,841,504 bytes
==10417== 
--10411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10411== 
==10411== HEAP SUMMARY:
==10411==     in use at exit: 3,111,782 bytes in 68,923 blocks
==10411==   total heap usage: 1,602,942 allocs, 1,534,019 frees, 129,625,986 bytes allocated
==10411== 
==10417== LEAK SUMMARY:
==10417==    definitely lost: 2,221 bytes in 14 blocks
==10417==    indirectly lost: 6,796 bytes in 9 blocks
==10417==      possibly lost: 0 bytes in 0 blocks
==10417==    still reachable: 3,128,577 bytes in 69,524 blocks
==10417==         suppressed: 0 bytes in 0 blocks
==10417== Rerun with --leak-check=full to see details of leaked memory
==10417== 
==10417== Use --track-origins=yes to see where uninitialised values come from
==10417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10417== 
==10417== 1 errors in context 1 of 2:
==10417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10417==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10417==    by 0x488CD0: stringsubst (subst.c:301)
==10417==    by 0x48801B: prefork (subst.c:77)
==10417==    by 0x42B318: execcmd (exec.c:2619)
==10417==    by 0x428CA0: execpline2 (exec.c:1697)
==10417==    by 0x427FD2: execpline (exec.c:1484)
==10417==    by 0x427756: execlist (exec.c:1267)
==10417==    by 0x42717C: execode (exec.c:1073)
==10417==    by 0x431299: runshfunc (exec.c:5040)
==10417==    by 0x430E76: doshfunc (exec.c:4920)
==10417==    by 0x4302FB: execshfunc (exec.c:4557)
==10417==    by 0x42D8C1: execcmd (exec.c:3373)
==10417== 
==10417== 
==10417== 2 errors in context 2 of 2:
==10417== Conditional jump or move depends on uninitialised value(s)
==10417==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10417==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10417==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10417==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10417==    by 0x42D8E9: execcmd (exec.c:3378)
==10417==    by 0x428CA0: execpline2 (exec.c:1697)
==10417==    by 0x427FD2: execpline (exec.c:1484)
==10417==    by 0x42779A: execlist (exec.c:1275)
==10417==    by 0x42717C: execode (exec.c:1073)
==10417==    by 0x431299: runshfunc (exec.c:5040)
==10417==    by 0x430E76: doshfunc (exec.c:4920)
==10417==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10417== 
==10417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== Searching for pointers to 68,923 not-freed blocks
--10411--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10411--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10411--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10411--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10411--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10411--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10411--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10411--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10411--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10411--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10411--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10411--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10411--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10411--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10411--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10411--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10411--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10411--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10411--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10411--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10411--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10411--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10411--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10411--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10411--   Scanning root segment: 0x701a000..0x701afff (4096)
--10411--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10411--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10411--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10411--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10411--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10411--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10411--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10411--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10411--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10411--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFE6BAC,  len 4
==10411== Checked 4,766,008 bytes
==10411== 
==10411== LEAK SUMMARY:
==10411==    definitely lost: 2,205 bytes in 14 blocks
==10411==    indirectly lost: 6,756 bytes in 7 blocks
==10411==      possibly lost: 0 bytes in 0 blocks
==10411==    still reachable: 3,102,821 bytes in 68,902 blocks
==10411==         suppressed: 0 bytes in 0 blocks
==10411== Rerun with --leak-check=full to see details of leaked memory
==10411== 
==10411== Use --track-origins=yes to see where uninitialised values come from
==10411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== 
==10411== 1 errors in context 1 of 2:
==10411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10411==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10411==    by 0x488CD0: stringsubst (subst.c:301)
==10411==    by 0x48801B: prefork (subst.c:77)
==10411==    by 0x42B318: execcmd (exec.c:2619)
==10411==    by 0x428CA0: execpline2 (exec.c:1697)
==10411==    by 0x427FD2: execpline (exec.c:1484)
==10411==    by 0x427756: execlist (exec.c:1267)
==10411==    by 0x42717C: execode (exec.c:1073)
==10411==    by 0x431299: runshfunc (exec.c:5040)
==10411==    by 0x430E76: doshfunc (exec.c:4920)
==10411==    by 0x4302FB: execshfunc (exec.c:4557)
==10411==    by 0x42D8C1: execcmd (exec.c:3373)
==10411== 
==10411== 
==10411== 2 errors in context 2 of 2:
==10411== Conditional jump or move depends on uninitialised value(s)
==10411==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10411==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10411==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10411==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10411==    by 0x42D8E9: execcmd (exec.c:3378)
==10411==    by 0x428CA0: execpline2 (exec.c:1697)
==10411==    by 0x427FD2: execpline (exec.c:1484)
==10411==    by 0x42779A: execlist (exec.c:1275)
==10411==    by 0x42717C: execode (exec.c:1073)
==10411==    by 0x431299: runshfunc (exec.c:5040)
==10411==    by 0x430E76: doshfunc (exec.c:4920)
==10411==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10411== 
==10411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10419-- Caught __NR_exit; running __libc_freeres()
==10419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10419-by-pythonnut-on-???
==10419== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10419-by-pythonnut-on-???
==10419== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10419-by-pythonnut-on-???
==10419== 
==10419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10419== don't want to do, unless you know exactly what you're doing,
==10419== or are doing some strange experiment):
==10419==   /usr/lib/valgrind/../../bin/vgdb --pid=10419 ...command...
==10419== 
==10419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10419==   /path/to/gdb ./zsh
==10419== and then give GDB the following command
==10419==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10419
==10419== --pid is optional if only one valgrind process is running
==10419== 
--10419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10419== 
==10419== HEAP SUMMARY:
==10419==     in use at exit: 3,137,839 bytes in 69,552 blocks
==10419==   total heap usage: 1,597,415 allocs, 1,527,863 frees, 129,046,160 bytes allocated
==10419== 
--10468-- Caught __NR_exit; running __libc_freeres()
==10469== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10469-by-pythonnut-on-???
==10469== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10469-by-pythonnut-on-???
==10469== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10469-by-pythonnut-on-???
==10469== 
==10469== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10469== don't want to do, unless you know exactly what you're doing,
==10469== or are doing some strange experiment):
==10469==   /usr/lib/valgrind/../../bin/vgdb --pid=10469 ...command...
==10469== 
==10469== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10469==   /path/to/gdb ./zsh
==10469== and then give GDB the following command
==10469==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10469
==10469== --pid is optional if only one valgrind process is running
==10469== 
==10468== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10468-by-pythonnut-on-???
==10468== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10468-by-pythonnut-on-???
==10468== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10468-by-pythonnut-on-???
==10468== 
==10468== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10468== don't want to do, unless you know exactly what you're doing,
==10468== or are doing some strange experiment):
==10468==   /usr/lib/valgrind/../../bin/vgdb --pid=10468 ...command...
==10468== 
==10468== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10468==   /path/to/gdb ./zsh
==10468== and then give GDB the following command
==10468==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10468
==10468== --pid is optional if only one valgrind process is running
==10468== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
==10470== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10470-by-pythonnut-on-???
==10470== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10470-by-pythonnut-on-???
==10470== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10470-by-pythonnut-on-???
==10470== 
==10470== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10470== don't want to do, unless you know exactly what you're doing,
==10470== or are doing some strange experiment):
==10470==   /usr/lib/valgrind/../../bin/vgdb --pid=10470 ...command...
==10470== 
==10470== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10470==   /path/to/gdb ./zsh
==10470== and then give GDB the following command
==10470==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10470
==10470== --pid is optional if only one valgrind process is running
==10470== 
==10419== Searching for pointers to 69,552 not-freed blocks
--10419--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10419--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10419--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10419--   Scanning root segment: 0x4037000..0x403efff (32768)
--10419--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10419--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10419--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10419--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10419--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10419--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10419--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10419--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10419--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10419--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10419--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10419--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10419--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10419--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10419--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10419--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10419--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10419--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10419--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10419--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10419--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10419--   Scanning root segment: 0x701a000..0x701afff (4096)
--10419--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10419--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10419--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10419--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10419--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10419--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10419--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10419--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10419--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10419--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10468-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
==10468== 
==10467== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10467-by-pythonnut-on-???
==10467== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10467-by-pythonnut-on-???
==10467== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10467-by-pythonnut-on-???
==10467== 
==10467== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10467== don't want to do, unless you know exactly what you're doing,
==10467== or are doing some strange experiment):
==10467==   /usr/lib/valgrind/../../bin/vgdb --pid=10467 ...command...
==10467== 
==10467== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10467==   /path/to/gdb ./zsh
==10467== and then give GDB the following command
==10467==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10467
==10467== --pid is optional if only one valgrind process is running
==10467== 
==10468== HEAP SUMMARY:
==10468==     in use at exit: 3,112,224 bytes in 68,934 blocks
==10468==   total heap usage: 1,602,972 allocs, 1,534,038 frees, 129,638,470 bytes allocated
==10468== 
==10468== Searching for pointers to 68,934 not-freed blocks
--10468--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10468--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10468--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10468--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10468--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10468--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10468--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10468--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10468--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10468--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10468--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10468--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10468--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10468--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10468--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10468--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10468--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10468--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10468--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10468--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10468--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10468--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10468--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10468--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10468--   Scanning root segment: 0x701a000..0x701afff (4096)
--10468--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10468--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10468--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10468--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10468--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10468--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10468--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10468--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10468--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10468--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10419== Checked 4,841,472 bytes
==10419== 
==10419== LEAK SUMMARY:
==10419==    definitely lost: 2,221 bytes in 14 blocks
==10419==    indirectly lost: 6,796 bytes in 9 blocks
==10419==      possibly lost: 0 bytes in 0 blocks
==10419==    still reachable: 3,128,822 bytes in 69,529 blocks
==10419==         suppressed: 0 bytes in 0 blocks
==10419== Rerun with --leak-check=full to see details of leaked memory
==10419== 
==10419== Use --track-origins=yes to see where uninitialised values come from
==10419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10419== 
==10419== 1 errors in context 1 of 2:
==10419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10419==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10419==    by 0x488CD0: stringsubst (subst.c:301)
==10419==    by 0x48801B: prefork (subst.c:77)
==10419==    by 0x42B318: execcmd (exec.c:2619)
==10419==    by 0x428CA0: execpline2 (exec.c:1697)
==10419==    by 0x427FD2: execpline (exec.c:1484)
==10419==    by 0x427756: execlist (exec.c:1267)
==10419==    by 0x42717C: execode (exec.c:1073)
==10419==    by 0x431299: runshfunc (exec.c:5040)
==10419==    by 0x430E76: doshfunc (exec.c:4920)
==10419==    by 0x4302FB: execshfunc (exec.c:4557)
==10419==    by 0x42D8C1: execcmd (exec.c:3373)
==10419== 
==10419== 
==10419== 2 errors in context 2 of 2:
==10419== Conditional jump or move depends on uninitialised value(s)
==10419==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10419==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10419==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10419==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10419==    by 0x42D8E9: execcmd (exec.c:3378)
==10419==    by 0x428CA0: execpline2 (exec.c:1697)
==10419==    by 0x427FD2: execpline (exec.c:1484)
==10419==    by 0x42779A: execlist (exec.c:1275)
==10419==    by 0x42717C: execode (exec.c:1073)
==10419==    by 0x431299: runshfunc (exec.c:5040)
==10419==    by 0x430E76: doshfunc (exec.c:4920)
==10419==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10419== 
==10419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10416-- Caught __NR_exit; running __libc_freeres()
==10468== Checked 4,770,376 bytes
==10468== 
--10416-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10468== LEAK SUMMARY:
==10468==    definitely lost: 2,205 bytes in 14 blocks
==10468==    indirectly lost: 6,756 bytes in 7 blocks
==10468==      possibly lost: 0 bytes in 0 blocks
==10468==    still reachable: 3,103,263 bytes in 68,913 blocks
==10468==         suppressed: 0 bytes in 0 blocks
==10468== Rerun with --leak-check=full to see details of leaked memory
==10468== 
==10468== Use --track-origins=yes to see where uninitialised values come from
==10468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10468== 
==10468== 1 errors in context 1 of 2:
==10468== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10468==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10468==    by 0x488CD0: stringsubst (subst.c:301)
==10468==    by 0x48801B: prefork (subst.c:77)
==10468==    by 0x42B318: execcmd (exec.c:2619)
==10468==    by 0x428CA0: execpline2 (exec.c:1697)
==10468==    by 0x427FD2: execpline (exec.c:1484)
==10468==    by 0x427756: execlist (exec.c:1267)
==10468==    by 0x42717C: execode (exec.c:1073)
==10468==    by 0x431299: runshfunc (exec.c:5040)
==10468==    by 0x430E76: doshfunc (exec.c:4920)
==10468==    by 0x4302FB: execshfunc (exec.c:4557)
==10468==    by 0x42D8C1: execcmd (exec.c:3373)
==10468== 
==10468== 
==10468== 2 errors in context 2 of 2:
==10468== Conditional jump or move depends on uninitialised value(s)
==10468==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10468==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10468==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10468==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10468==    by 0x42D8E9: execcmd (exec.c:3378)
==10468==    by 0x428CA0: execpline2 (exec.c:1697)
==10468==    by 0x427FD2: execpline (exec.c:1484)
==10468==    by 0x42779A: execlist (exec.c:1275)
==10468==    by 0x42717C: execode (exec.c:1073)
==10468==    by 0x431299: runshfunc (exec.c:5040)
==10468==    by 0x430E76: doshfunc (exec.c:4920)
==10468==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10468== 
==10468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10416== 
==10416== HEAP SUMMARY:
==10416==     in use at exit: 3,135,675 bytes in 69,477 blocks
==10416==   total heap usage: 1,597,366 allocs, 1,527,889 frees, 129,046,771 bytes allocated
==10416== 
--10467-- Caught __NR_exit; running __libc_freeres()
--10467-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10467== 
==10416== Searching for pointers to 69,477 not-freed blocks
--10416--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10416--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==10467== HEAP SUMMARY:
==10467==     in use at exit: 3,112,192 bytes in 68,934 blocks
==10467==   total heap usage: 1,602,976 allocs, 1,534,042 frees, 129,638,006 bytes allocated
==10467== 
--10416--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10416--   Scanning root segment: 0x4037000..0x403afff (16384)
--10416--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10416--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10416--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10416--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10416--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10416--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10416--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10416--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10416--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10416--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10416--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10416--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10416--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10416--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10416--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10416--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10416--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10416--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10416--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10416--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10416--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10416--   Scanning root segment: 0x701a000..0x701afff (4096)
--10416--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10416--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10416--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10416--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10416--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10416--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10416--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10416--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10416--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10416--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10467== Searching for pointers to 68,934 not-freed blocks
--10467--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10467--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10467--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10467--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10467--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10467--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10467--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10467--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10467--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10467--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10467--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10467--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10467--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10467--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10467--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10467--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10467--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10467--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10467--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10467--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10467--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10467--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10467--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10467--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10467--   Scanning root segment: 0x701a000..0x701afff (4096)
--10467--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10467--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10467--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10467--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10467--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10467--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10467--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10467--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10467--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10467--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10416== Checked 4,821,400 bytes
==10416== 
==10416== LEAK SUMMARY:
==10416==    definitely lost: 2,221 bytes in 14 blocks
==10416==    indirectly lost: 6,796 bytes in 9 blocks
==10416==      possibly lost: 0 bytes in 0 blocks
==10416==    still reachable: 3,126,658 bytes in 69,454 blocks
==10416==         suppressed: 0 bytes in 0 blocks
==10416== Rerun with --leak-check=full to see details of leaked memory
==10416== 
==10416== Use --track-origins=yes to see where uninitialised values come from
==10416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10416== 
==10416== 1 errors in context 1 of 2:
==10416== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10416==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10416==    by 0x488CD0: stringsubst (subst.c:301)
==10416==    by 0x48801B: prefork (subst.c:77)
==10416==    by 0x42B318: execcmd (exec.c:2619)
==10416==    by 0x428CA0: execpline2 (exec.c:1697)
==10416==    by 0x427FD2: execpline (exec.c:1484)
==10416==    by 0x427756: execlist (exec.c:1267)
==10416==    by 0x42717C: execode (exec.c:1073)
==10416==    by 0x431299: runshfunc (exec.c:5040)
==10416==    by 0x430E76: doshfunc (exec.c:4920)
==10416==    by 0x4302FB: execshfunc (exec.c:4557)
==10416==    by 0x42D8C1: execcmd (exec.c:3373)
==10416== 
==10416== 
==10416== 2 errors in context 2 of 2:
==10416== Conditional jump or move depends on uninitialised value(s)
==10416==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10416==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10416==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10416==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10416==    by 0x42D8E9: execcmd (exec.c:3378)
==10416==    by 0x428CA0: execpline2 (exec.c:1697)
==10416==    by 0x427FD2: execpline (exec.c:1484)
==10416==    by 0x42779A: execlist (exec.c:1275)
==10416==    by 0x42717C: execode (exec.c:1073)
==10416==    by 0x431299: runshfunc (exec.c:5040)
==10416==    by 0x430E76: doshfunc (exec.c:4920)
==10416==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10416== 
==10416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10467== Checked 4,770,064 bytes
==10467== 
==10472== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10472-by-pythonnut-on-???
==10472== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10472-by-pythonnut-on-???
==10472== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10472-by-pythonnut-on-???
==10472== 
==10472== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10472== don't want to do, unless you know exactly what you're doing,
==10472== or are doing some strange experiment):
==10472==   /usr/lib/valgrind/../../bin/vgdb --pid=10472 ...command...
==10472== 
==10472== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10472==   /path/to/gdb ./zsh
==10472== and then give GDB the following command
==10472==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10472
==10472== --pid is optional if only one valgrind process is running
==10472== 
--10472-- Caught __NR_exit; running __libc_freeres()
==10473== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10473-by-pythonnut-on-???
==10473== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10473-by-pythonnut-on-???
==10473== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10473-by-pythonnut-on-???
==10473== 
==10473== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10473== don't want to do, unless you know exactly what you're doing,
==10473== or are doing some strange experiment):
==10473==   /usr/lib/valgrind/../../bin/vgdb --pid=10473 ...command...
==10473== 
==10473== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10473==   /path/to/gdb ./zsh
==10473== and then give GDB the following command
==10473==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10473
==10473== --pid is optional if only one valgrind process is running
==10473== 
==10467== LEAK SUMMARY:
==10467==    definitely lost: 2,205 bytes in 14 blocks
==10467==    indirectly lost: 6,756 bytes in 7 blocks
==10467==      possibly lost: 0 bytes in 0 blocks
==10467==    still reachable: 3,103,231 bytes in 68,913 blocks
==10467==         suppressed: 0 bytes in 0 blocks
==10467== Rerun with --leak-check=full to see details of leaked memory
==10467== 
==10467== Use --track-origins=yes to see where uninitialised values come from
==10467== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10467== 
==10467== 1 errors in context 1 of 2:
==10467== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10467==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10467==    by 0x488CD0: stringsubst (subst.c:301)
==10467==    by 0x48801B: prefork (subst.c:77)
==10467==    by 0x42B318: execcmd (exec.c:2619)
==10467==    by 0x428CA0: execpline2 (exec.c:1697)
==10467==    by 0x427FD2: execpline (exec.c:1484)
==10467==    by 0x427756: execlist (exec.c:1267)
==10467==    by 0x42717C: execode (exec.c:1073)
==10467==    by 0x431299: runshfunc (exec.c:5040)
==10467==    by 0x430E76: doshfunc (exec.c:4920)
==10467==    by 0x4302FB: execshfunc (exec.c:4557)
==10467==    by 0x42D8C1: execcmd (exec.c:3373)
==10467== 
==10467== 
==10467== 2 errors in context 2 of 2:
==10467== Conditional jump or move depends on uninitialised value(s)
==10467==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10467==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10467==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10467==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10467==    by 0x42D8E9: execcmd (exec.c:3378)
==10467==    by 0x428CA0: execpline2 (exec.c:1697)
==10467==    by 0x427FD2: execpline (exec.c:1484)
==10467==    by 0x42779A: execlist (exec.c:1275)
==10467==    by 0x42717C: execode (exec.c:1073)
==10467==    by 0x431299: runshfunc (exec.c:5040)
==10467==    by 0x430E76: doshfunc (exec.c:4920)
==10467==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10467== 
==10467== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
--10472-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10472== 
==10472== HEAP SUMMARY:
==10472==     in use at exit: 3,137,448 bytes in 69,539 blocks
==10472==   total heap usage: 1,597,435 allocs, 1,527,896 frees, 129,055,534 bytes allocated
==10472== 
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--10474-- Caught __NR_exit; running __libc_freeres()
==10472== Searching for pointers to 69,539 not-freed blocks
==10474== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10474-by-pythonnut-on-???
==10474== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10474-by-pythonnut-on-???
--10472--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==10474== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10474-by-pythonnut-on-???
==10474== 
==10474== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10474== don't want to do, unless you know exactly what you're doing,
==10474== or are doing some strange experiment):
==10474==   /usr/lib/valgrind/../../bin/vgdb --pid=10474 ...command...
==10474== 
==10474== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10474==   /path/to/gdb ./zsh
==10474== and then give GDB the following command
==10474==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10474
==10474== --pid is optional if only one valgrind process is running
==10474== 
--10472--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10472--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10472--   Scanning root segment: 0x4037000..0x403efff (32768)
--10472--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10472--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10472--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10472--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10472--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10472--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10472--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10472--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10472--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10472--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10472--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10472--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10472--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10472--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10472--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10472--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10472--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10472--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10472--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10472--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10472--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10472--   Scanning root segment: 0x701a000..0x701afff (4096)
--10472--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10472--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10472--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10472--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10472--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10472--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10472--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10472--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10472--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10472--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10474-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10474== 
==10474== HEAP SUMMARY:
==10474==     in use at exit: 3,112,423 bytes in 68,939 blocks
==10474==   total heap usage: 1,602,987 allocs, 1,534,048 frees, 129,643,094 bytes allocated
==10474== 
==10474== Searching for pointers to 68,939 not-freed blocks
--10474--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10474--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10474--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10474--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10474--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10474--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10474--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10474--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10474--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10474--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10474--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10474--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10474--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10474--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10474--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10474--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10474--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10474--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10474--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10474--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10474--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10474--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10474--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10474--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10474--   Scanning root segment: 0x701a000..0x701afff (4096)
--10474--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10474--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10474--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10474--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10474--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10474--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10474--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10474--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10474--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10474--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10472== Checked 4,840,040 bytes
==10472== 
==10472== LEAK SUMMARY:
==10472==    definitely lost: 2,221 bytes in 14 blocks
==10472==    indirectly lost: 6,796 bytes in 9 blocks
==10472==      possibly lost: 0 bytes in 0 blocks
==10472==    still reachable: 3,128,431 bytes in 69,516 blocks
==10472==         suppressed: 0 bytes in 0 blocks
==10472== Rerun with --leak-check=full to see details of leaked memory
==10472== 
==10472== Use --track-origins=yes to see where uninitialised values come from
==10472== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10472== 
==10472== 1 errors in context 1 of 2:
==10472== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10472==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10472==    by 0x488CD0: stringsubst (subst.c:301)
==10472==    by 0x48801B: prefork (subst.c:77)
==10472==    by 0x42B318: execcmd (exec.c:2619)
==10472==    by 0x428CA0: execpline2 (exec.c:1697)
==10472==    by 0x427FD2: execpline (exec.c:1484)
==10472==    by 0x427756: execlist (exec.c:1267)
==10472==    by 0x42717C: execode (exec.c:1073)
==10472==    by 0x431299: runshfunc (exec.c:5040)
==10472==    by 0x430E76: doshfunc (exec.c:4920)
==10472==    by 0x4302FB: execshfunc (exec.c:4557)
==10472==    by 0x42D8C1: execcmd (exec.c:3373)
==10472== 
==10472== 
==10472== 2 errors in context 2 of 2:
==10472== Conditional jump or move depends on uninitialised value(s)
==10472==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10472==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10472==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10472==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10472==    by 0x42D8E9: execcmd (exec.c:3378)
==10472==    by 0x428CA0: execpline2 (exec.c:1697)
==10472==    by 0x427FD2: execpline (exec.c:1484)
==10472==    by 0x42779A: execlist (exec.c:1275)
==10472==    by 0x42717C: execode (exec.c:1073)
==10472==    by 0x431299: runshfunc (exec.c:5040)
==10472==    by 0x430E76: doshfunc (exec.c:4920)
==10472==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10472== 
==10472== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10471-by-pythonnut-on-???
==10471== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10471-by-pythonnut-on-???
==10471== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10471-by-pythonnut-on-???
==10471== 
==10471== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10471== don't want to do, unless you know exactly what you're doing,
==10471== or are doing some strange experiment):
==10471==   /usr/lib/valgrind/../../bin/vgdb --pid=10471 ...command...
==10471== 
==10471== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10471==   /path/to/gdb ./zsh
==10471== and then give GDB the following command
==10471==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10471
==10471== --pid is optional if only one valgrind process is running
==10471== 
--10471-- Caught __NR_exit; running __libc_freeres()
==10474== Checked 4,770,016 bytes
==10474== 
--10471-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10471== 
==10471== HEAP SUMMARY:
==10471==     in use at exit: 3,137,384 bytes in 69,536 blocks
==10471==   total heap usage: 1,597,437 allocs, 1,527,901 frees, 129,056,078 bytes allocated
==10471== 
==10474== LEAK SUMMARY:
==10474==    definitely lost: 2,205 bytes in 14 blocks
==10474==    indirectly lost: 6,756 bytes in 7 blocks
==10474==      possibly lost: 0 bytes in 0 blocks
==10474==    still reachable: 3,103,462 bytes in 68,918 blocks
==10474==         suppressed: 0 bytes in 0 blocks
==10474== Rerun with --leak-check=full to see details of leaked memory
==10474== 
==10474== Use --track-origins=yes to see where uninitialised values come from
==10474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10474== 
==10474== 1 errors in context 1 of 2:
==10474== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10474==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10474==    by 0x488CD0: stringsubst (subst.c:301)
==10474==    by 0x48801B: prefork (subst.c:77)
==10474==    by 0x42B318: execcmd (exec.c:2619)
==10474==    by 0x428CA0: execpline2 (exec.c:1697)
==10474==    by 0x427FD2: execpline (exec.c:1484)
==10474==    by 0x427756: execlist (exec.c:1267)
==10474==    by 0x42717C: execode (exec.c:1073)
==10474==    by 0x431299: runshfunc (exec.c:5040)
==10474==    by 0x430E76: doshfunc (exec.c:4920)
==10474==    by 0x4302FB: execshfunc (exec.c:4557)
==10474==    by 0x42D8C1: execcmd (exec.c:3373)
==10474== 
==10474== 
==10474== 2 errors in context 2 of 2:
==10474== Conditional jump or move depends on uninitialised value(s)
==10474==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10474==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10474==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10474==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10474==    by 0x42D8E9: execcmd (exec.c:3378)
==10474==    by 0x428CA0: execpline2 (exec.c:1697)
==10474==    by 0x427FD2: execpline (exec.c:1484)
==10474==    by 0x42779A: execlist (exec.c:1275)
==10474==    by 0x42717C: execode (exec.c:1073)
==10474==    by 0x431299: runshfunc (exec.c:5040)
==10474==    by 0x430E76: doshfunc (exec.c:4920)
==10474==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10474== 
==10474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== Searching for pointers to 69,536 not-freed blocks
--10471--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10471--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10471--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10471--   Scanning root segment: 0x4037000..0x403efff (32768)
--10471--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10471--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10471--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10471--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10471--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10471--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10471--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10471--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10471--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10471--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10471--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10471--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10471--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10471--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10471--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10471--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10471--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10471--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10471--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10471--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10471--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10471--   Scanning root segment: 0x701a000..0x701afff (4096)
--10471--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10471--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10471--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10471--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10471--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10471--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10471--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10471--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10471--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10471--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
==10479== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10479-by-pythonnut-on-???
==10479== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10479-by-pythonnut-on-???
==10479== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10479-by-pythonnut-on-???
==10479== 
==10479== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10479== don't want to do, unless you know exactly what you're doing,
==10479== or are doing some strange experiment):
==10479==   /usr/lib/valgrind/../../bin/vgdb --pid=10479 ...command...
==10479== 
==10479== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10479==   /path/to/gdb ./zsh
==10479== and then give GDB the following command
==10479==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10479
==10479== --pid is optional if only one valgrind process is running
==10479== 
--10478-- Caught __NR_exit; running __libc_freeres()
==10478== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10478-by-pythonnut-on-???
==10478== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10478-by-pythonnut-on-???
==10478== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10478-by-pythonnut-on-???
==10478== 
==10478== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10478== don't want to do, unless you know exactly what you're doing,
==10478== or are doing some strange experiment):
==10478==   /usr/lib/valgrind/../../bin/vgdb --pid=10478 ...command...
==10478== 
==10478== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10478==   /path/to/gdb ./zsh
==10478== and then give GDB the following command
==10478==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10478
==10478== --pid is optional if only one valgrind process is running
==10478== 
--10478-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10478== 
==10478== HEAP SUMMARY:
==10478==     in use at exit: 3,112,530 bytes in 68,943 blocks
==10478==   total heap usage: 1,602,995 allocs, 1,534,052 frees, 129,645,313 bytes allocated
==10478== 
==10478== Searching for pointers to 68,943 not-freed blocks
--10478--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10478--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10478--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10478--   Scanning root segment: 0x4037000..0x403afff (16384)
--10478--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10478--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10478--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10478--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10478--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10478--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10478--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10478--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10478--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10478--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10478--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10478--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10478--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10478--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10478--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10478--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10478--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10478--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10478--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10478--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10478--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10478--   Scanning root segment: 0x701a000..0x701afff (4096)
--10478--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10478--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10478--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10478--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10478--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10478--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10478--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10478--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10478--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10478--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10471== Checked 4,839,352 bytes
==10471== 
==10471== LEAK SUMMARY:
==10471==    definitely lost: 2,221 bytes in 14 blocks
==10471==    indirectly lost: 6,796 bytes in 9 blocks
==10471==      possibly lost: 0 bytes in 0 blocks
==10471==    still reachable: 3,128,367 bytes in 69,513 blocks
==10471==         suppressed: 0 bytes in 0 blocks
==10471== Rerun with --leak-check=full to see details of leaked memory
==10471== 
==10471== Use --track-origins=yes to see where uninitialised values come from
==10471== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== 
==10471== 1 errors in context 1 of 2:
==10471== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10471==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10471==    by 0x488CD0: stringsubst (subst.c:301)
==10471==    by 0x48801B: prefork (subst.c:77)
==10471==    by 0x42B318: execcmd (exec.c:2619)
==10471==    by 0x428CA0: execpline2 (exec.c:1697)
==10471==    by 0x427FD2: execpline (exec.c:1484)
==10471==    by 0x427756: execlist (exec.c:1267)
==10471==    by 0x42717C: execode (exec.c:1073)
==10471==    by 0x431299: runshfunc (exec.c:5040)
==10471==    by 0x430E76: doshfunc (exec.c:4920)
==10471==    by 0x4302FB: execshfunc (exec.c:4557)
==10471==    by 0x42D8C1: execcmd (exec.c:3373)
==10471== 
==10471== 
==10471== 2 errors in context 2 of 2:
==10471== Conditional jump or move depends on uninitialised value(s)
==10471==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10471==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10471==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10471==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10471==    by 0x42D8E9: execcmd (exec.c:3378)
==10471==    by 0x428CA0: execpline2 (exec.c:1697)
==10471==    by 0x427FD2: execpline (exec.c:1484)
==10471==    by 0x42779A: execlist (exec.c:1275)
==10471==    by 0x42717C: execode (exec.c:1073)
==10471==    by 0x431299: runshfunc (exec.c:5040)
==10471==    by 0x430E76: doshfunc (exec.c:4920)
==10471==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10471== 
==10471== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10480== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10480-by-pythonnut-on-???
==10480== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10480-by-pythonnut-on-???
==10480== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10480-by-pythonnut-on-???
==10480== 
==10480== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10480== don't want to do, unless you know exactly what you're doing,
==10480== or are doing some strange experiment):
==10480==   /usr/lib/valgrind/../../bin/vgdb --pid=10480 ...command...
==10480== 
==10480== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10480==   /path/to/gdb ./zsh
==10480== and then give GDB the following command
==10480==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10480
==10480== --pid is optional if only one valgrind process is running
==10480== 
--10480-- Caught __NR_exit; running __libc_freeres()
--10480-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10480== 
==10480== HEAP SUMMARY:
==10480==     in use at exit: 3,137,388 bytes in 69,536 blocks
==10480==   total heap usage: 1,597,454 allocs, 1,527,918 frees, 129,061,098 bytes allocated
==10480== 
==10478== Checked 4,786,768 bytes
==10478== 
==10480== Searching for pointers to 69,536 not-freed blocks
--10480--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10480--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10480--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10480--   Scanning root segment: 0x4037000..0x403efff (32768)
--10480--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10480--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10480--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10480--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10480--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10480--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10480--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10480--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10480--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10480--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10480--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10480--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10480--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10480--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10480--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10480--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10480--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10480--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10480--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10480--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10480--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10480--   Scanning root segment: 0x701a000..0x701afff (4096)
--10480--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10480--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10480--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10480--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10480--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10480--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10480--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10480--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10480--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10480--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10478== LEAK SUMMARY:
==10478==    definitely lost: 2,205 bytes in 14 blocks
==10478==    indirectly lost: 6,756 bytes in 7 blocks
==10478==      possibly lost: 0 bytes in 0 blocks
==10478==    still reachable: 3,103,569 bytes in 68,922 blocks
==10478==         suppressed: 0 bytes in 0 blocks
==10478== Rerun with --leak-check=full to see details of leaked memory
==10478== 
==10478== Use --track-origins=yes to see where uninitialised values come from
==10478== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10478== 
==10478== 1 errors in context 1 of 2:
==10478== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10478==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10478==    by 0x488CD0: stringsubst (subst.c:301)
==10478==    by 0x48801B: prefork (subst.c:77)
==10478==    by 0x42B318: execcmd (exec.c:2619)
==10478==    by 0x428CA0: execpline2 (exec.c:1697)
==10478==    by 0x427FD2: execpline (exec.c:1484)
==10478==    by 0x427756: execlist (exec.c:1267)
==10478==    by 0x42717C: execode (exec.c:1073)
==10478==    by 0x431299: runshfunc (exec.c:5040)
==10478==    by 0x430E76: doshfunc (exec.c:4920)
==10478==    by 0x4302FB: execshfunc (exec.c:4557)
==10478==    by 0x42D8C1: execcmd (exec.c:3373)
==10478== 
==10478== 
==10478== 2 errors in context 2 of 2:
==10478== Conditional jump or move depends on uninitialised value(s)
==10478==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10478==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10478==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10478==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10478==    by 0x42D8E9: execcmd (exec.c:3378)
==10478==    by 0x428CA0: execpline2 (exec.c:1697)
==10478==    by 0x427FD2: execpline (exec.c:1484)
==10478==    by 0x42779A: execlist (exec.c:1275)
==10478==    by 0x42717C: execode (exec.c:1073)
==10478==    by 0x431299: runshfunc (exec.c:5040)
==10478==    by 0x430E76: doshfunc (exec.c:4920)
==10478==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10478== 
==10478== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
==10480== Checked 4,839,360 bytes
==10480== 
--10483-- Caught __NR_exit; running __libc_freeres()
==10483== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10483-by-pythonnut-on-???
==10483== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10483-by-pythonnut-on-???
==10483== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10483-by-pythonnut-on-???
==10483== 
==10483== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10483== don't want to do, unless you know exactly what you're doing,
==10483== or are doing some strange experiment):
==10483==   /usr/lib/valgrind/../../bin/vgdb --pid=10483 ...command...
==10483== 
==10483== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10483==   /path/to/gdb ./zsh
==10483== and then give GDB the following command
==10483==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10483
==10483== --pid is optional if only one valgrind process is running
==10483== 
==10480== LEAK SUMMARY:
==10480==    definitely lost: 2,221 bytes in 14 blocks
==10480==    indirectly lost: 6,796 bytes in 9 blocks
==10480==      possibly lost: 0 bytes in 0 blocks
==10480==    still reachable: 3,128,371 bytes in 69,513 blocks
==10480==         suppressed: 0 bytes in 0 blocks
==10480== Rerun with --leak-check=full to see details of leaked memory
==10480== 
==10480== Use --track-origins=yes to see where uninitialised values come from
==10480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10480== 
==10480== 1 errors in context 1 of 2:
==10480== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10480==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10480==    by 0x488CD0: stringsubst (subst.c:301)
==10480==    by 0x48801B: prefork (subst.c:77)
==10480==    by 0x42B318: execcmd (exec.c:2619)
==10480==    by 0x428CA0: execpline2 (exec.c:1697)
==10480==    by 0x427FD2: execpline (exec.c:1484)
==10480==    by 0x427756: execlist (exec.c:1267)
==10480==    by 0x42717C: execode (exec.c:1073)
==10480==    by 0x431299: runshfunc (exec.c:5040)
==10480==    by 0x430E76: doshfunc (exec.c:4920)
==10480==    by 0x4302FB: execshfunc (exec.c:4557)
==10480==    by 0x42D8C1: execcmd (exec.c:3373)
==10480== 
==10480== 
==10480== 2 errors in context 2 of 2:
==10480== Conditional jump or move depends on uninitialised value(s)
==10480==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10480==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10480==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10480==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10480==    by 0x42D8E9: execcmd (exec.c:3378)
==10480==    by 0x428CA0: execpline2 (exec.c:1697)
==10480==    by 0x427FD2: execpline (exec.c:1484)
==10480==    by 0x42779A: execlist (exec.c:1275)
==10480==    by 0x42717C: execode (exec.c:1073)
==10480==    by 0x431299: runshfunc (exec.c:5040)
==10480==    by 0x430E76: doshfunc (exec.c:4920)
==10480==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10480== 
==10480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10483-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10484== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10484-by-pythonnut-on-???
==10484== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10484-by-pythonnut-on-???
==10484== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10484-by-pythonnut-on-???
==10484== 
==10484== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10484== don't want to do, unless you know exactly what you're doing,
==10484== or are doing some strange experiment):
==10484==   /usr/lib/valgrind/../../bin/vgdb --pid=10484 ...command...
==10484== 
==10484== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10484==   /path/to/gdb ./zsh
==10484== and then give GDB the following command
==10484==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10484
==10484== --pid is optional if only one valgrind process is running
==10484== 
--10484-- Caught __NR_exit; running __libc_freeres()
==10483== 
==10483== HEAP SUMMARY:
==10483==     in use at exit: 3,111,864 bytes in 68,928 blocks
==10483==   total heap usage: 1,603,045 allocs, 1,534,117 frees, 129,651,728 bytes allocated
==10483== 
--10484-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10483== Searching for pointers to 68,928 not-freed blocks
--10483--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10483--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10483--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10483--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10483--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10483--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10483--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10483--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10483--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10483--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10483--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10483--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10483--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10483--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10483--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10483--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10483--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10483--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10483--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10483--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10483--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10483--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10483--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10483--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10483--   Scanning root segment: 0x701a000..0x701afff (4096)
--10483--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10483--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10483--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10483--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10483--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10483--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10483--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10483--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10483--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10483--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10484== 
==10484== HEAP SUMMARY:
==10484==     in use at exit: 3,137,387 bytes in 69,536 blocks
==10484==   total heap usage: 1,597,459 allocs, 1,527,923 frees, 129,063,211 bytes allocated
==10484== 
==10484== Searching for pointers to 69,536 not-freed blocks
--10484--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10484--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10484--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10484--   Scanning root segment: 0x4037000..0x403efff (32768)
--10484--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10484--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10484--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10484--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10484--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10484--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10484--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10484--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10484--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10484--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10484--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10484--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10484--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10484--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10484--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10484--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10484--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10484--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10484--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10484--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10484--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10484--   Scanning root segment: 0x701a000..0x701afff (4096)
--10484--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10484--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10484--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10484--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10484--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10484--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10484--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10484--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10484--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10484--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10483== Checked 4,786,960 bytes
==10483== 
==10483== LEAK SUMMARY:
==10483==    definitely lost: 2,205 bytes in 14 blocks
==10483==    indirectly lost: 6,756 bytes in 7 blocks
==10483==      possibly lost: 0 bytes in 0 blocks
==10483==    still reachable: 3,102,903 bytes in 68,907 blocks
==10483==         suppressed: 0 bytes in 0 blocks
==10483== Rerun with --leak-check=full to see details of leaked memory
==10483== 
==10483== Use --track-origins=yes to see where uninitialised values come from
==10483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10483== 
==10483== 1 errors in context 1 of 2:
==10483== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10483==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10483==    by 0x488CD0: stringsubst (subst.c:301)
==10483==    by 0x48801B: prefork (subst.c:77)
==10483==    by 0x42B318: execcmd (exec.c:2619)
==10483==    by 0x428CA0: execpline2 (exec.c:1697)
==10483==    by 0x427FD2: execpline (exec.c:1484)
==10483==    by 0x427756: execlist (exec.c:1267)
==10483==    by 0x42717C: execode (exec.c:1073)
==10483==    by 0x431299: runshfunc (exec.c:5040)
==10483==    by 0x430E76: doshfunc (exec.c:4920)
==10483==    by 0x4302FB: execshfunc (exec.c:4557)
==10483==    by 0x42D8C1: execcmd (exec.c:3373)
==10483== 
==10483== 
==10483== 2 errors in context 2 of 2:
==10483== Conditional jump or move depends on uninitialised value(s)
==10483==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10483==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10483==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10483==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10483==    by 0x42D8E9: execcmd (exec.c:3378)
==10483==    by 0x428CA0: execpline2 (exec.c:1697)
==10483==    by 0x427FD2: execpline (exec.c:1484)
==10483==    by 0x42779A: execlist (exec.c:1275)
==10483==    by 0x42717C: execode (exec.c:1073)
==10483==    by 0x431299: runshfunc (exec.c:5040)
==10483==    by 0x430E76: doshfunc (exec.c:4920)
==10483==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10483== 
==10483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10484== Checked 4,839,360 bytes
==10484== 
client request: code 4d430005,  addr 0xFFEFF617C,  len 4
==10484== LEAK SUMMARY:
==10484==    definitely lost: 2,221 bytes in 14 blocks
==10484==    indirectly lost: 6,796 bytes in 9 blocks
==10484==      possibly lost: 0 bytes in 0 blocks
==10484==    still reachable: 3,128,370 bytes in 69,513 blocks
==10484==         suppressed: 0 bytes in 0 blocks
==10484== Rerun with --leak-check=full to see details of leaked memory
==10484== 
==10484== Use --track-origins=yes to see where uninitialised values come from
==10484== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10484== 
==10484== 1 errors in context 1 of 2:
==10484== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10484==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10484==    by 0x488CD0: stringsubst (subst.c:301)
==10484==    by 0x48801B: prefork (subst.c:77)
==10484==    by 0x42B318: execcmd (exec.c:2619)
==10484==    by 0x428CA0: execpline2 (exec.c:1697)
==10484==    by 0x427FD2: execpline (exec.c:1484)
==10484==    by 0x427756: execlist (exec.c:1267)
==10484==    by 0x42717C: execode (exec.c:1073)
==10484==    by 0x431299: runshfunc (exec.c:5040)
==10484==    by 0x430E76: doshfunc (exec.c:4920)
==10484==    by 0x4302FB: execshfunc (exec.c:4557)
==10484==    by 0x42D8C1: execcmd (exec.c:3373)
==10484== 
==10484== 
==10484== 2 errors in context 2 of 2:
==10484== Conditional jump or move depends on uninitialised value(s)
==10484==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10484==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10484==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10484==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10484==    by 0x42D8E9: execcmd (exec.c:3378)
==10484==    by 0x428CA0: execpline2 (exec.c:1697)
==10484==    by 0x427FD2: execpline (exec.c:1484)
==10484==    by 0x42779A: execlist (exec.c:1275)
==10484==    by 0x42717C: execode (exec.c:1073)
==10484==    by 0x431299: runshfunc (exec.c:5040)
==10484==    by 0x430E76: doshfunc (exec.c:4920)
==10484==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10484== 
==10484== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10486== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10486-by-pythonnut-on-???
==10486== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10486-by-pythonnut-on-???
==10486== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10486-by-pythonnut-on-???
==10486== 
==10486== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10486== don't want to do, unless you know exactly what you're doing,
==10486== or are doing some strange experiment):
==10486==   /usr/lib/valgrind/../../bin/vgdb --pid=10486 ...command...
==10486== 
==10486== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10486==   /path/to/gdb ./zsh
==10486== and then give GDB the following command
==10486==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10486
==10486== --pid is optional if only one valgrind process is running
==10486== 
--10486-- Caught __NR_exit; running __libc_freeres()
==10487== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10487-by-pythonnut-on-???
==10487== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10487-by-pythonnut-on-???
==10487== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10487-by-pythonnut-on-???
==10487== 
==10487== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10487== don't want to do, unless you know exactly what you're doing,
==10487== or are doing some strange experiment):
==10487==   /usr/lib/valgrind/../../bin/vgdb --pid=10487 ...command...
==10487== 
==10487== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10487==   /path/to/gdb ./zsh
==10487== and then give GDB the following command
==10487==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10487
==10487== --pid is optional if only one valgrind process is running
==10487== 
--10486-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10486== 
==10489== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10489-by-pythonnut-on-???
==10489== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10489-by-pythonnut-on-???
==10489== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10489-by-pythonnut-on-???
==10489== 
==10489== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10489== don't want to do, unless you know exactly what you're doing,
==10489== or are doing some strange experiment):
==10489==   /usr/lib/valgrind/../../bin/vgdb --pid=10489 ...command...
==10489== 
==10489== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10489==   /path/to/gdb ./zsh
==10489== and then give GDB the following command
==10489==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10489
==10489== --pid is optional if only one valgrind process is running
==10489== 
==10486== HEAP SUMMARY:
==10486==     in use at exit: 3,137,386 bytes in 69,536 blocks
==10486==   total heap usage: 1,597,464 allocs, 1,527,928 frees, 129,065,324 bytes allocated
==10486== 
==10490== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10490-by-pythonnut-on-???
==10490== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10490-by-pythonnut-on-???
==10490== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10490-by-pythonnut-on-???
==10490== 
==10490== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10490== don't want to do, unless you know exactly what you're doing,
==10490== or are doing some strange experiment):
==10490==   /usr/lib/valgrind/../../bin/vgdb --pid=10490 ...command...
==10490== 
==10490== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10490==   /path/to/gdb ./zsh
==10490== and then give GDB the following command
==10490==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10490
==10490== --pid is optional if only one valgrind process is running
==10490== 
--10491-- Caught __NR_exit; running __libc_freeres()
==10486== Searching for pointers to 69,536 not-freed blocks
--10486--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10486--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10486--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10486--   Scanning root segment: 0x4037000..0x403efff (32768)
--10486--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10486--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10486--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10486--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10486--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10486--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10486--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10486--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10486--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10486--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10486--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10486--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10486--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10486--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10486--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10486--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10486--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10491== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10491-by-pythonnut-on-???
--10486--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==10491== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10491-by-pythonnut-on-???
==10491== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10491-by-pythonnut-on-???
==10491== 
==10491== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10491== don't want to do, unless you know exactly what you're doing,
==10491== or are doing some strange experiment):
==10491==   /usr/lib/valgrind/../../bin/vgdb --pid=10491 ...command...
==10491== 
==10491== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10491==   /path/to/gdb ./zsh
==10491== and then give GDB the following command
==10491==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10491
--10486--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==10491== --pid is optional if only one valgrind process is running
==10491== 
--10486--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10486--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10486--   Scanning root segment: 0x701a000..0x701afff (4096)
--10486--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10486--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10486--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10486--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10486--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10486--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10486--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10486--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10486--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10486--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--10491-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10493-- Caught __NR_exit; running __libc_freeres()
==10491== 
==10491== HEAP SUMMARY:
==10491==     in use at exit: 3,113,243 bytes in 68,982 blocks
==10491==   total heap usage: 1,603,281 allocs, 1,534,299 frees, 129,674,131 bytes allocated
==10491== 
==10493== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10493-by-pythonnut-on-???
==10493== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10493-by-pythonnut-on-???
==10493== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10493-by-pythonnut-on-???
==10493== 
==10493== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10493== don't want to do, unless you know exactly what you're doing,
==10493== or are doing some strange experiment):
==10493==   /usr/lib/valgrind/../../bin/vgdb --pid=10493 ...command...
==10493== 
==10493== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10493==   /path/to/gdb ./zsh
==10493== and then give GDB the following command
==10493==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10493
==10493== --pid is optional if only one valgrind process is running
==10493== 
--10493-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10491== Searching for pointers to 68,982 not-freed blocks
--10491--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10491--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10491--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10491--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10491--   Scanning root segment: 0x4222000..0x4222fff (4096)
==10493== 
--10491--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10491--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10491--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10491--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10491--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10491--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10491--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10491--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10491--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10491--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10491--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10491--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10491--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10491--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10491--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10491--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10491--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10491--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10491--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10491--   Scanning root segment: 0x701a000..0x701afff (4096)
--10491--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10491--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10491--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10491--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10491--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10491--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10491--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10491--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10491--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10491--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10493== HEAP SUMMARY:
==10493==     in use at exit: 3,114,432 bytes in 68,971 blocks
==10493==   total heap usage: 1,603,267 allocs, 1,534,296 frees, 129,785,031 bytes allocated
==10493== 
==10493== Searching for pointers to 68,971 not-freed blocks
--10493--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10493--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10493--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10493--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10493--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10493--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10493--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10493--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10493--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10493--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10493--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10493--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10493--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10493--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10493--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10493--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10493--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10493--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10493--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10493--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10493--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10493--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10493--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10493--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10493--   Scanning root segment: 0x701a000..0x701afff (4096)
--10493--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10493--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10493--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10493--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10493--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10493--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10493--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10493--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10493--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10493--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10486== Checked 4,839,360 bytes
==10486== 
==10486== LEAK SUMMARY:
==10486==    definitely lost: 2,221 bytes in 14 blocks
==10486==    indirectly lost: 6,796 bytes in 9 blocks
==10486==      possibly lost: 0 bytes in 0 blocks
==10486==    still reachable: 3,128,369 bytes in 69,513 blocks
==10486==         suppressed: 0 bytes in 0 blocks
==10486== Rerun with --leak-check=full to see details of leaked memory
==10486== 
==10486== Use --track-origins=yes to see where uninitialised values come from
==10486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10486== 
==10486== 1 errors in context 1 of 2:
==10486== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10486==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10486==    by 0x488CD0: stringsubst (subst.c:301)
==10486==    by 0x48801B: prefork (subst.c:77)
==10486==    by 0x42B318: execcmd (exec.c:2619)
==10486==    by 0x428CA0: execpline2 (exec.c:1697)
==10486==    by 0x427FD2: execpline (exec.c:1484)
==10486==    by 0x427756: execlist (exec.c:1267)
==10486==    by 0x42717C: execode (exec.c:1073)
==10486==    by 0x431299: runshfunc (exec.c:5040)
==10486==    by 0x430E76: doshfunc (exec.c:4920)
==10486==    by 0x4302FB: execshfunc (exec.c:4557)
==10486==    by 0x42D8C1: execcmd (exec.c:3373)
==10486== 
==10486== 
==10486== 2 errors in context 2 of 2:
==10486== Conditional jump or move depends on uninitialised value(s)
==10486==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10486==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10486==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10486==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10486==    by 0x42D8E9: execcmd (exec.c:3378)
==10486==    by 0x428CA0: execpline2 (exec.c:1697)
==10486==    by 0x427FD2: execpline (exec.c:1484)
==10486==    by 0x42779A: execlist (exec.c:1275)
==10486==    by 0x42717C: execode (exec.c:1073)
==10486==    by 0x431299: runshfunc (exec.c:5040)
==10486==    by 0x430E76: doshfunc (exec.c:4920)
==10486==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10486== 
==10486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10495== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10495-by-pythonnut-on-???
==10495== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10495-by-pythonnut-on-???
==10495== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10495-by-pythonnut-on-???
==10495== 
==10495== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10495== don't want to do, unless you know exactly what you're doing,
==10495== or are doing some strange experiment):
==10495==   /usr/lib/valgrind/../../bin/vgdb --pid=10495 ...command...
==10495== 
==10495== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10495==   /path/to/gdb ./zsh
==10495== and then give GDB the following command
==10495==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10495
==10495== --pid is optional if only one valgrind process is running
==10495== 
--10495-- Caught __NR_exit; running __libc_freeres()
==10491== Checked 4,789,608 bytes
==10491== 
==10491== LEAK SUMMARY:
==10491==    definitely lost: 2,205 bytes in 14 blocks
==10491==    indirectly lost: 6,756 bytes in 7 blocks
==10491==      possibly lost: 0 bytes in 0 blocks
==10491==    still reachable: 3,104,282 bytes in 68,961 blocks
==10491==         suppressed: 0 bytes in 0 blocks
==10491== Rerun with --leak-check=full to see details of leaked memory
==10491== 
==10491== Use --track-origins=yes to see where uninitialised values come from
==10491== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10491== 
==10491== 1 errors in context 1 of 2:
==10491== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10491==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10491==    by 0x488CD0: stringsubst (subst.c:301)
==10491==    by 0x48801B: prefork (subst.c:77)
==10491==    by 0x42B318: execcmd (exec.c:2619)
==10491==    by 0x428CA0: execpline2 (exec.c:1697)
==10491==    by 0x427FD2: execpline (exec.c:1484)
==10491==    by 0x427756: execlist (exec.c:1267)
==10491==    by 0x42717C: execode (exec.c:1073)
==10491==    by 0x431299: runshfunc (exec.c:5040)
==10491==    by 0x430E76: doshfunc (exec.c:4920)
==10491==    by 0x4302FB: execshfunc (exec.c:4557)
==10491==    by 0x42D8C1: execcmd (exec.c:3373)
==10491== 
==10491== 
==10491== 2 errors in context 2 of 2:
==10491== Conditional jump or move depends on uninitialised value(s)
==10491==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10491==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10491==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10491==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10491==    by 0x42D8E9: execcmd (exec.c:3378)
==10491==    by 0x428CA0: execpline2 (exec.c:1697)
==10491==    by 0x427FD2: execpline (exec.c:1484)
==10491==    by 0x42779A: execlist (exec.c:1275)
==10491==    by 0x42717C: execode (exec.c:1073)
==10491==    by 0x431299: runshfunc (exec.c:5040)
==10491==    by 0x430E76: doshfunc (exec.c:4920)
==10491==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10491== 
==10491== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10495-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10488-- Caught __NR_exit; running __libc_freeres()
==10495== 
==10493== Checked 4,775,464 bytes
==10493== 
==10495== HEAP SUMMARY:
==10495==     in use at exit: 3,137,385 bytes in 69,536 blocks
==10495==   total heap usage: 1,597,469 allocs, 1,527,933 frees, 129,067,437 bytes allocated
==10495== 
==10488== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10488-by-pythonnut-on-???
==10488== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10488-by-pythonnut-on-???
==10488== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10488-by-pythonnut-on-???
==10488== 
==10488== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10488== don't want to do, unless you know exactly what you're doing,
==10488== or are doing some strange experiment):
==10488==   /usr/lib/valgrind/../../bin/vgdb --pid=10488 ...command...
==10488== 
==10488== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10488==   /path/to/gdb ./zsh
==10488== and then give GDB the following command
==10488==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10488
==10488== --pid is optional if only one valgrind process is running
==10488== 
--10488-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10493== LEAK SUMMARY:
==10493==    definitely lost: 2,205 bytes in 14 blocks
==10493==    indirectly lost: 6,756 bytes in 7 blocks
==10493==      possibly lost: 0 bytes in 0 blocks
==10493==    still reachable: 3,105,471 bytes in 68,950 blocks
==10493==         suppressed: 0 bytes in 0 blocks
==10493== Rerun with --leak-check=full to see details of leaked memory
==10493== 
==10493== Use --track-origins=yes to see where uninitialised values come from
==10493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10493== 
==10493== 1 errors in context 1 of 2:
==10493== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10493==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10493==    by 0x488CD0: stringsubst (subst.c:301)
==10493==    by 0x48801B: prefork (subst.c:77)
==10493==    by 0x42B318: execcmd (exec.c:2619)
==10493==    by 0x428CA0: execpline2 (exec.c:1697)
==10493==    by 0x427FD2: execpline (exec.c:1484)
==10493==    by 0x427756: execlist (exec.c:1267)
==10493==    by 0x42717C: execode (exec.c:1073)
==10493==    by 0x431299: runshfunc (exec.c:5040)
==10493==    by 0x430E76: doshfunc (exec.c:4920)
==10493==    by 0x4302FB: execshfunc (exec.c:4557)
==10493==    by 0x42D8C1: execcmd (exec.c:3373)
==10493== 
==10493== 
==10493== 2 errors in context 2 of 2:
==10493== Conditional jump or move depends on uninitialised value(s)
==10493==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10493==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10493==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10493==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10493==    by 0x42D8E9: execcmd (exec.c:3378)
==10493==    by 0x428CA0: execpline2 (exec.c:1697)
==10493==    by 0x427FD2: execpline (exec.c:1484)
==10493==    by 0x42779A: execlist (exec.c:1275)
==10493==    by 0x42717C: execode (exec.c:1073)
==10493==    by 0x431299: runshfunc (exec.c:5040)
==10493==    by 0x430E76: doshfunc (exec.c:4920)
==10493==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10493== 
==10493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10488== 
==10488== HEAP SUMMARY:
==10488==     in use at exit: 3,113,179 bytes in 68,979 blocks
==10488==   total heap usage: 1,603,279 allocs, 1,534,300 frees, 129,673,890 bytes allocated
==10488== 
==10495== Searching for pointers to 69,536 not-freed blocks
--10495--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10495--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10495--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10495--   Scanning root segment: 0x4037000..0x403efff (32768)
--10495--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10495--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10495--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10495--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10495--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10495--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10495--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10495--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10495--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10495--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10495--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10495--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10495--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10495--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10495--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10495--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10495--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10495--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10495--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10495--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10495--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10495--   Scanning root segment: 0x701a000..0x701afff (4096)
--10495--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10495--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10495--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10495--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10495--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10495--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10495--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10495--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10495--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10495--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF073C,  len 4
==10488== Searching for pointers to 68,979 not-freed blocks
--10488--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10488--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10488--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10488--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10488--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10488--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10488--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10488--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10488--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10488--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10488--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10488--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10488--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10488--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10488--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10488--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10488--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10488--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10488--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10488--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10488--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10488--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10488--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10488--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10488--   Scanning root segment: 0x701a000..0x701afff (4096)
--10488--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10488--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10488--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10488--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10488--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10488--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10488--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10488--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10488--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10488--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10495== Checked 4,839,360 bytes
==10495== 
==10488== Checked 4,788,920 bytes
==10488== 
==10495== LEAK SUMMARY:
==10495==    definitely lost: 2,221 bytes in 14 blocks
==10495==    indirectly lost: 6,796 bytes in 9 blocks
==10495==      possibly lost: 0 bytes in 0 blocks
==10495==    still reachable: 3,128,368 bytes in 69,513 blocks
==10495==         suppressed: 0 bytes in 0 blocks
==10495== Rerun with --leak-check=full to see details of leaked memory
==10495== 
==10495== Use --track-origins=yes to see where uninitialised values come from
==10495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10495== 
==10495== 1 errors in context 1 of 2:
==10495== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10495==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10495==    by 0x488CD0: stringsubst (subst.c:301)
==10495==    by 0x48801B: prefork (subst.c:77)
==10495==    by 0x42B318: execcmd (exec.c:2619)
==10495==    by 0x428CA0: execpline2 (exec.c:1697)
==10495==    by 0x427FD2: execpline (exec.c:1484)
==10495==    by 0x427756: execlist (exec.c:1267)
==10495==    by 0x42717C: execode (exec.c:1073)
==10495==    by 0x431299: runshfunc (exec.c:5040)
==10495==    by 0x430E76: doshfunc (exec.c:4920)
==10495==    by 0x4302FB: execshfunc (exec.c:4557)
==10495==    by 0x42D8C1: execcmd (exec.c:3373)
==10495== 
==10495== 
==10495== 2 errors in context 2 of 2:
==10495== Conditional jump or move depends on uninitialised value(s)
==10495==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10495==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10495==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10495==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10495==    by 0x42D8E9: execcmd (exec.c:3378)
==10495==    by 0x428CA0: execpline2 (exec.c:1697)
==10495==    by 0x427FD2: execpline (exec.c:1484)
==10495==    by 0x42779A: execlist (exec.c:1275)
==10495==    by 0x42717C: execode (exec.c:1073)
==10495==    by 0x431299: runshfunc (exec.c:5040)
==10495==    by 0x430E76: doshfunc (exec.c:4920)
==10495==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10495== 
==10495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10536== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10536-by-pythonnut-on-???
==10536== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10536-by-pythonnut-on-???
==10536== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10536-by-pythonnut-on-???
==10536== 
==10536== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10536== don't want to do, unless you know exactly what you're doing,
==10536== or are doing some strange experiment):
==10536==   /usr/lib/valgrind/../../bin/vgdb --pid=10536 ...command...
==10536== 
==10536== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10536==   /path/to/gdb ./zsh
==10536== and then give GDB the following command
==10536==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10536
==10536== --pid is optional if only one valgrind process is running
==10536== 
--10536-- Caught __NR_exit; running __libc_freeres()
==10488== LEAK SUMMARY:
==10488==    definitely lost: 2,205 bytes in 14 blocks
==10488==    indirectly lost: 6,756 bytes in 7 blocks
==10488==      possibly lost: 0 bytes in 0 blocks
==10488==    still reachable: 3,104,218 bytes in 68,958 blocks
==10488==         suppressed: 0 bytes in 0 blocks
==10488== Rerun with --leak-check=full to see details of leaked memory
==10488== 
==10488== Use --track-origins=yes to see where uninitialised values come from
==10488== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10488== 
==10488== 1 errors in context 1 of 2:
==10488== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10488==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10488==    by 0x488CD0: stringsubst (subst.c:301)
==10488==    by 0x48801B: prefork (subst.c:77)
==10488==    by 0x42B318: execcmd (exec.c:2619)
==10488==    by 0x428CA0: execpline2 (exec.c:1697)
==10488==    by 0x427FD2: execpline (exec.c:1484)
==10488==    by 0x427756: execlist (exec.c:1267)
==10488==    by 0x42717C: execode (exec.c:1073)
==10488==    by 0x431299: runshfunc (exec.c:5040)
==10488==    by 0x430E76: doshfunc (exec.c:4920)
==10488==    by 0x4302FB: execshfunc (exec.c:4557)
==10488==    by 0x42D8C1: execcmd (exec.c:3373)
==10488== 
==10488== 
==10488== 2 errors in context 2 of 2:
==10488== Conditional jump or move depends on uninitialised value(s)
==10488==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10488==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10488==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10488==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10488==    by 0x42D8E9: execcmd (exec.c:3378)
==10488==    by 0x428CA0: execpline2 (exec.c:1697)
==10488==    by 0x427FD2: execpline (exec.c:1484)
==10488==    by 0x42779A: execlist (exec.c:1275)
==10488==    by 0x42717C: execode (exec.c:1073)
==10488==    by 0x431299: runshfunc (exec.c:5040)
==10488==    by 0x430E76: doshfunc (exec.c:4920)
==10488==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10488== 
==10488== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10547== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10547-by-pythonnut-on-???
==10547== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10547-by-pythonnut-on-???
==10547== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10547-by-pythonnut-on-???
==10547== 
==10547== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10547== don't want to do, unless you know exactly what you're doing,
==10547== or are doing some strange experiment):
==10547==   /usr/lib/valgrind/../../bin/vgdb --pid=10547 ...command...
==10547== 
==10547== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10547==   /path/to/gdb ./zsh
==10547== and then give GDB the following command
==10547==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10547
==10547== --pid is optional if only one valgrind process is running
==10547== 
--10547-- Caught __NR_exit; running __libc_freeres()
--10496-- Caught __NR_exit; running __libc_freeres()
--10536-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10536== 
==10536== HEAP SUMMARY:
==10536==     in use at exit: 3,137,384 bytes in 69,536 blocks
==10536==   total heap usage: 1,597,474 allocs, 1,527,938 frees, 129,069,550 bytes allocated
==10536== 
==10496== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10496-by-pythonnut-on-???
==10496== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10496-by-pythonnut-on-???
==10496== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10496-by-pythonnut-on-???
==10496== 
==10496== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10496== don't want to do, unless you know exactly what you're doing,
==10496== or are doing some strange experiment):
==10496==   /usr/lib/valgrind/../../bin/vgdb --pid=10496 ...command...
==10496== 
==10496== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10496==   /path/to/gdb ./zsh
==10496== and then give GDB the following command
==10496==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10496
==10496== --pid is optional if only one valgrind process is running
==10496== 
--10547-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10496-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10547== 
==10496== 
==10547== HEAP SUMMARY:
==10547==     in use at exit: 3,113,186 bytes in 68,979 blocks
==10547==   total heap usage: 1,603,294 allocs, 1,534,315 frees, 129,678,888 bytes allocated
==10547== 
==10496== HEAP SUMMARY:
==10496==     in use at exit: 3,114,823 bytes in 68,979 blocks
==10496==   total heap usage: 1,603,283 allocs, 1,534,304 frees, 129,789,142 bytes allocated
==10496== 
==10536== Searching for pointers to 69,536 not-freed blocks
--10536--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10536--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10536--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10536--   Scanning root segment: 0x4037000..0x403efff (32768)
--10536--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10536--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10536--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10536--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10536--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10536--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10536--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10536--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10536--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10536--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10536--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10536--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10536--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10536--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10536--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10536--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10536--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10536--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10536--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10536--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10536--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10536--   Scanning root segment: 0x701a000..0x701afff (4096)
--10536--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10536--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10536--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10536--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10536--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10536--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10536--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10536--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10536--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10536--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10496== Searching for pointers to 68,979 not-freed blocks
==10547== Searching for pointers to 68,979 not-freed blocks
--10496--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10547--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10496--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10547--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10496--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10547--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10547--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10496--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10547--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10496--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10547--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10496--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10547--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10496--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10547--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10496--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10547--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10547--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10496--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10547--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10496--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10547--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10496--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10547--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10547--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10496--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10547--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10547--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10496--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10547--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10496--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10496--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10547--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10496--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10547--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10496--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10547--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10496--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10496--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10496--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10547--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10547--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10547--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10547--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10496--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10547--   Scanning root segment: 0x701a000..0x701afff (4096)
--10496--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10547--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10496--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10496--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10547--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10547--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10496--   Scanning root segment: 0x701a000..0x701afff (4096)
--10496--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10496--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10547--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10496--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10547--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10496--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10547--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10496--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10547--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10496--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10547--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10496--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10496--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10547--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10547--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10496--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10496--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10536== Checked 4,839,360 bytes
==10536== 
==10496== Checked 4,775,568 bytes
==10547== Checked 4,789,056 bytes
==10496== 
==10547== 
==10536== LEAK SUMMARY:
==10536==    definitely lost: 2,221 bytes in 14 blocks
==10536==    indirectly lost: 6,796 bytes in 9 blocks
==10536==      possibly lost: 0 bytes in 0 blocks
==10536==    still reachable: 3,128,367 bytes in 69,513 blocks
==10536==         suppressed: 0 bytes in 0 blocks
==10536== Rerun with --leak-check=full to see details of leaked memory
==10536== 
==10536== Use --track-origins=yes to see where uninitialised values come from
==10536== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10536== 
==10536== 1 errors in context 1 of 2:
==10536== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10536==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10536==    by 0x488CD0: stringsubst (subst.c:301)
==10536==    by 0x48801B: prefork (subst.c:77)
==10536==    by 0x42B318: execcmd (exec.c:2619)
==10536==    by 0x428CA0: execpline2 (exec.c:1697)
==10536==    by 0x427FD2: execpline (exec.c:1484)
==10536==    by 0x427756: execlist (exec.c:1267)
==10536==    by 0x42717C: execode (exec.c:1073)
==10536==    by 0x431299: runshfunc (exec.c:5040)
==10536==    by 0x430E76: doshfunc (exec.c:4920)
==10536==    by 0x4302FB: execshfunc (exec.c:4557)
==10536==    by 0x42D8C1: execcmd (exec.c:3373)
==10536== 
==10536== 
==10536== 2 errors in context 2 of 2:
==10536== Conditional jump or move depends on uninitialised value(s)
==10536==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10536==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10536==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10536==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10536==    by 0x42D8E9: execcmd (exec.c:3378)
==10536==    by 0x428CA0: execpline2 (exec.c:1697)
==10536==    by 0x427FD2: execpline (exec.c:1484)
==10536==    by 0x42779A: execlist (exec.c:1275)
==10536==    by 0x42717C: execode (exec.c:1073)
==10536==    by 0x431299: runshfunc (exec.c:5040)
==10536==    by 0x430E76: doshfunc (exec.c:4920)
==10536==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10536== 
==10536== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10548-by-pythonnut-on-???
==10548== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10548-by-pythonnut-on-???
==10548== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10548-by-pythonnut-on-???
==10548== 
==10548== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10548== don't want to do, unless you know exactly what you're doing,
==10548== or are doing some strange experiment):
==10548==   /usr/lib/valgrind/../../bin/vgdb --pid=10548 ...command...
==10548== 
==10548== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10548==   /path/to/gdb ./zsh
==10548== and then give GDB the following command
==10548==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10548
==10548== --pid is optional if only one valgrind process is running
==10548== 
==10496== LEAK SUMMARY:
==10547== LEAK SUMMARY:
==10496==    definitely lost: 2,205 bytes in 14 blocks
==10547==    definitely lost: 2,205 bytes in 14 blocks
==10496==    indirectly lost: 6,756 bytes in 7 blocks
==10547==    indirectly lost: 6,756 bytes in 7 blocks
==10496==      possibly lost: 0 bytes in 0 blocks
==10547==      possibly lost: 0 bytes in 0 blocks
==10496==    still reachable: 3,105,862 bytes in 68,958 blocks
==10547==    still reachable: 3,104,225 bytes in 68,958 blocks
==10496==         suppressed: 0 bytes in 0 blocks
==10547==         suppressed: 0 bytes in 0 blocks
==10496== Rerun with --leak-check=full to see details of leaked memory
==10547== Rerun with --leak-check=full to see details of leaked memory
==10496== 
==10547== 
==10496== Use --track-origins=yes to see where uninitialised values come from
==10496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10496== 
==10496== 1 errors in context 1 of 2:
==10496== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10547== Use --track-origins=yes to see where uninitialised values come from
==10547== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10547== 
==10547== 1 errors in context 1 of 2:
==10547== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10496==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10547==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10496==    by 0x488CD0: stringsubst (subst.c:301)
==10547==    by 0x488CD0: stringsubst (subst.c:301)
==10496==    by 0x48801B: prefork (subst.c:77)
==10547==    by 0x48801B: prefork (subst.c:77)
==10547==    by 0x42B318: execcmd (exec.c:2619)
==10496==    by 0x42B318: execcmd (exec.c:2619)
==10547==    by 0x428CA0: execpline2 (exec.c:1697)
==10496==    by 0x428CA0: execpline2 (exec.c:1697)
==10547==    by 0x427FD2: execpline (exec.c:1484)
==10496==    by 0x427FD2: execpline (exec.c:1484)
==10547==    by 0x427756: execlist (exec.c:1267)
==10496==    by 0x427756: execlist (exec.c:1267)
==10547==    by 0x42717C: execode (exec.c:1073)
==10496==    by 0x42717C: execode (exec.c:1073)
==10547==    by 0x431299: runshfunc (exec.c:5040)
==10496==    by 0x431299: runshfunc (exec.c:5040)
==10547==    by 0x430E76: doshfunc (exec.c:4920)
==10496==    by 0x430E76: doshfunc (exec.c:4920)
==10547==    by 0x4302FB: execshfunc (exec.c:4557)
==10496==    by 0x4302FB: execshfunc (exec.c:4557)
==10547==    by 0x42D8C1: execcmd (exec.c:3373)
==10496==    by 0x42D8C1: execcmd (exec.c:3373)
==10547== 
==10496== 
==10547== 
==10496== 
==10547== 2 errors in context 2 of 2:
==10496== 2 errors in context 2 of 2:
==10547== Conditional jump or move depends on uninitialised value(s)
==10496== Conditional jump or move depends on uninitialised value(s)
==10547==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10496==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10547==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10496==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10547==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10496==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10547==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10496==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10547==    by 0x42D8E9: execcmd (exec.c:3378)
==10496==    by 0x42D8E9: execcmd (exec.c:3378)
==10547==    by 0x428CA0: execpline2 (exec.c:1697)
==10496==    by 0x428CA0: execpline2 (exec.c:1697)
==10547==    by 0x427FD2: execpline (exec.c:1484)
==10496==    by 0x427FD2: execpline (exec.c:1484)
==10547==    by 0x42779A: execlist (exec.c:1275)
==10496==    by 0x42779A: execlist (exec.c:1275)
==10547==    by 0x42717C: execode (exec.c:1073)
==10496==    by 0x42717C: execode (exec.c:1073)
==10547==    by 0x431299: runshfunc (exec.c:5040)
==10496==    by 0x431299: runshfunc (exec.c:5040)
==10547==    by 0x430E76: doshfunc (exec.c:4920)
==10496==    by 0x430E76: doshfunc (exec.c:4920)
==10547==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10496==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10547== 
==10496== 
==10547== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10548-- Caught __NR_exit; running __libc_freeres()
--10490-- Caught __NR_exit; running __libc_freeres()
--10549-- Caught __NR_exit; running __libc_freeres()
--10548-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10490-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10549== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10549-by-pythonnut-on-???
==10549== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10549-by-pythonnut-on-???
==10549== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10549-by-pythonnut-on-???
==10549== 
==10549== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10549== don't want to do, unless you know exactly what you're doing,
==10549== or are doing some strange experiment):
==10549==   /usr/lib/valgrind/../../bin/vgdb --pid=10549 ...command...
==10549== 
==10549== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10549==   /path/to/gdb ./zsh
==10549== and then give GDB the following command
==10549==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10549
==10549== --pid is optional if only one valgrind process is running
==10549== 
==10548== 
==10548== HEAP SUMMARY:
==10548==     in use at exit: 3,137,383 bytes in 69,536 blocks
==10548==   total heap usage: 1,597,482 allocs, 1,527,946 frees, 129,073,203 bytes allocated
==10548== 
==10490== 
==10490== HEAP SUMMARY:
==10490==     in use at exit: 3,113,961 bytes in 68,960 blocks
==10490==   total heap usage: 1,603,292 allocs, 1,534,332 frees, 129,791,145 bytes allocated
==10490== 
--10549-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10549== 
==10549== HEAP SUMMARY:
==10549==     in use at exit: 3,113,346 bytes in 68,980 blocks
==10549==   total heap usage: 1,603,311 allocs, 1,534,331 frees, 129,683,739 bytes allocated
==10549== 
==10548== Searching for pointers to 69,536 not-freed blocks
--10548--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10548--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10548--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10548--   Scanning root segment: 0x4037000..0x403efff (32768)
--10548--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10548--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10548--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10548--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10548--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10548--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10548--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10548--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10548--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10548--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10548--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10548--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10548--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10548--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10548--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10548--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10548--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10548--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10548--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10548--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10548--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10548--   Scanning root segment: 0x701a000..0x701afff (4096)
--10548--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10548--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10548--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10548--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10548--   Scanning root segment: 0xb268000..0xb268fff (4096)
==10490== Searching for pointers to 68,960 not-freed blocks
--10490--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10548--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10548--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10548--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10548--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10490--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10548--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10490--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10490--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10490--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10490--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10490--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10490--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10490--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10490--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10490--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10490--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10490--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10490--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10490--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10490--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10490--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10490--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10490--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10490--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10490--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10490--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10490--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10490--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10490--   Scanning root segment: 0x701a000..0x701afff (4096)
--10490--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10490--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10490--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10490--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10490--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10490--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10490--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10490--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10490--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10490--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10549== Searching for pointers to 68,980 not-freed blocks
--10549--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10549--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10549--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10549--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10549--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10549--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10549--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10549--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10549--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10549--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10549--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10549--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10549--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10549--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10549--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10549--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10549--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10549--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10549--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10549--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10549--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10549--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10549--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10549--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10549--   Scanning root segment: 0x701a000..0x701afff (4096)
--10549--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10549--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10549--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10549--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10549--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10549--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10549--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10549--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10549--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10549--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10490== Checked 4,772,952 bytes
==10490== 
==10548== Checked 4,839,360 bytes
==10548== 
==10549== Checked 4,788,400 bytes
==10549== 
==10490== LEAK SUMMARY:
==10490==    definitely lost: 2,205 bytes in 14 blocks
==10490==    indirectly lost: 6,756 bytes in 7 blocks
==10490==      possibly lost: 0 bytes in 0 blocks
==10490==    still reachable: 3,105,000 bytes in 68,939 blocks
==10490==         suppressed: 0 bytes in 0 blocks
==10490== Rerun with --leak-check=full to see details of leaked memory
==10490== 
==10490== Use --track-origins=yes to see where uninitialised values come from
==10490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10490== 
==10490== 1 errors in context 1 of 2:
==10490== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10490==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10490==    by 0x488CD0: stringsubst (subst.c:301)
==10490==    by 0x48801B: prefork (subst.c:77)
==10490==    by 0x42B318: execcmd (exec.c:2619)
==10490==    by 0x428CA0: execpline2 (exec.c:1697)
==10490==    by 0x427FD2: execpline (exec.c:1484)
==10490==    by 0x427756: execlist (exec.c:1267)
==10490==    by 0x42717C: execode (exec.c:1073)
==10490==    by 0x431299: runshfunc (exec.c:5040)
==10490==    by 0x430E76: doshfunc (exec.c:4920)
==10490==    by 0x4302FB: execshfunc (exec.c:4557)
==10490==    by 0x42D8C1: execcmd (exec.c:3373)
==10490== 
==10490== 
==10490== 2 errors in context 2 of 2:
==10490== Conditional jump or move depends on uninitialised value(s)
==10490==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10490==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10490==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10490==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10490==    by 0x42D8E9: execcmd (exec.c:3378)
==10490==    by 0x428CA0: execpline2 (exec.c:1697)
==10490==    by 0x427FD2: execpline (exec.c:1484)
==10490==    by 0x42779A: execlist (exec.c:1275)
==10490==    by 0x42717C: execode (exec.c:1073)
==10490==    by 0x431299: runshfunc (exec.c:5040)
==10490==    by 0x430E76: doshfunc (exec.c:4920)
==10490==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10490== 
==10490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== LEAK SUMMARY:
==10548==    definitely lost: 2,221 bytes in 14 blocks
==10548==    indirectly lost: 6,796 bytes in 9 blocks
==10548==      possibly lost: 0 bytes in 0 blocks
==10548==    still reachable: 3,128,366 bytes in 69,513 blocks
==10548==         suppressed: 0 bytes in 0 blocks
==10548== Rerun with --leak-check=full to see details of leaked memory
==10548== 
==10548== Use --track-origins=yes to see where uninitialised values come from
==10548== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== 
==10548== 1 errors in context 1 of 2:
==10548== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10548==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10548==    by 0x488CD0: stringsubst (subst.c:301)
==10548==    by 0x48801B: prefork (subst.c:77)
==10548==    by 0x42B318: execcmd (exec.c:2619)
==10548==    by 0x428CA0: execpline2 (exec.c:1697)
==10548==    by 0x427FD2: execpline (exec.c:1484)
==10548==    by 0x427756: execlist (exec.c:1267)
==10548==    by 0x42717C: execode (exec.c:1073)
==10548==    by 0x431299: runshfunc (exec.c:5040)
==10548==    by 0x430E76: doshfunc (exec.c:4920)
==10548==    by 0x4302FB: execshfunc (exec.c:4557)
==10548==    by 0x42D8C1: execcmd (exec.c:3373)
==10548== 
==10548== 
==10548== 2 errors in context 2 of 2:
==10548== Conditional jump or move depends on uninitialised value(s)
==10548==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10548==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10548==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10548==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10548==    by 0x42D8E9: execcmd (exec.c:3378)
==10548==    by 0x428CA0: execpline2 (exec.c:1697)
==10548==    by 0x427FD2: execpline (exec.c:1484)
==10548==    by 0x42779A: execlist (exec.c:1275)
==10548==    by 0x42717C: execode (exec.c:1073)
==10548==    by 0x431299: runshfunc (exec.c:5040)
==10548==    by 0x430E76: doshfunc (exec.c:4920)
==10548==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10548== 
==10548== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10549== LEAK SUMMARY:
==10549==    definitely lost: 2,205 bytes in 14 blocks
==10549==    indirectly lost: 6,756 bytes in 7 blocks
==10549==      possibly lost: 0 bytes in 0 blocks
==10549==    still reachable: 3,104,385 bytes in 68,959 blocks
==10549==         suppressed: 0 bytes in 0 blocks
==10549== Rerun with --leak-check=full to see details of leaked memory
==10549== 
==10549== Use --track-origins=yes to see where uninitialised values come from
==10549== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10549== 
==10549== 1 errors in context 1 of 2:
==10549== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10549==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10549==    by 0x488CD0: stringsubst (subst.c:301)
==10549==    by 0x48801B: prefork (subst.c:77)
==10549==    by 0x42B318: execcmd (exec.c:2619)
==10549==    by 0x428CA0: execpline2 (exec.c:1697)
==10549==    by 0x427FD2: execpline (exec.c:1484)
==10549==    by 0x427756: execlist (exec.c:1267)
==10549==    by 0x42717C: execode (exec.c:1073)
==10549==    by 0x431299: runshfunc (exec.c:5040)
==10549==    by 0x430E76: doshfunc (exec.c:4920)
==10549==    by 0x4302FB: execshfunc (exec.c:4557)
==10549==    by 0x42D8C1: execcmd (exec.c:3373)
==10549== 
==10549== 
==10549== 2 errors in context 2 of 2:
==10549== Conditional jump or move depends on uninitialised value(s)
==10549==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10549==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10549==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10549==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10549==    by 0x42D8E9: execcmd (exec.c:3378)
==10549==    by 0x428CA0: execpline2 (exec.c:1697)
==10549==    by 0x427FD2: execpline (exec.c:1484)
==10549==    by 0x42779A: execlist (exec.c:1275)
==10549==    by 0x42717C: execode (exec.c:1073)
==10549==    by 0x431299: runshfunc (exec.c:5040)
==10549==    by 0x430E76: doshfunc (exec.c:4920)
==10549==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10549== 
==10549== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10551-by-pythonnut-on-???
==10551== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10551-by-pythonnut-on-???
==10551== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10551-by-pythonnut-on-???
==10551== 
==10551== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10551== don't want to do, unless you know exactly what you're doing,
==10551== or are doing some strange experiment):
==10551==   /usr/lib/valgrind/../../bin/vgdb --pid=10551 ...command...
==10551== 
==10551== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10551==   /path/to/gdb ./zsh
==10551== and then give GDB the following command
==10551==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10551
==10551== --pid is optional if only one valgrind process is running
==10551== 
--10551-- Caught __NR_exit; running __libc_freeres()
--10552-- Caught __NR_exit; running __libc_freeres()
==10552== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10552-by-pythonnut-on-???
==10553== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10553-by-pythonnut-on-???
==10552== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10552-by-pythonnut-on-???
==10553== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10553-by-pythonnut-on-???
==10552== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10552-by-pythonnut-on-???
==10553== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10553-by-pythonnut-on-???
==10552== 
==10553== 
==10552== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10552== don't want to do, unless you know exactly what you're doing,
==10552== or are doing some strange experiment):
==10552==   /usr/lib/valgrind/../../bin/vgdb --pid=10552 ...command...
==10553== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10553== don't want to do, unless you know exactly what you're doing,
==10553== or are doing some strange experiment):
==10553==   /usr/lib/valgrind/../../bin/vgdb --pid=10553 ...command...
==10552== 
==10553== 
==10552== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10552==   /path/to/gdb ./zsh
==10552== and then give GDB the following command
==10552==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10552
==10553== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10553==   /path/to/gdb ./zsh
==10553== and then give GDB the following command
==10553==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10553
==10552== --pid is optional if only one valgrind process is running
==10553== --pid is optional if only one valgrind process is running
==10552== 
==10553== 
==10554== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10554-by-pythonnut-on-???
--10553-- Caught __NR_exit; running __libc_freeres()
==10554== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10554-by-pythonnut-on-???
==10554== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10554-by-pythonnut-on-???
==10554== 
==10554== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10554== don't want to do, unless you know exactly what you're doing,
==10554== or are doing some strange experiment):
==10554==   /usr/lib/valgrind/../../bin/vgdb --pid=10554 ...command...
==10554== 
==10554== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10554==   /path/to/gdb ./zsh
==10554== and then give GDB the following command
==10554==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10554
==10554== --pid is optional if only one valgrind process is running
==10554== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--10552-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10551-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10552== 
--10553-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10551== 
==10552== HEAP SUMMARY:
==10552==     in use at exit: 3,115,702 bytes in 69,022 blocks
==10552==   total heap usage: 1,603,358 allocs, 1,534,336 frees, 129,799,722 bytes allocated
==10552== 
==10551== HEAP SUMMARY:
==10551==     in use at exit: 3,137,386 bytes in 69,536 blocks
==10551==   total heap usage: 1,597,484 allocs, 1,527,948 frees, 129,073,780 bytes allocated
==10551== 
==10553== 
==10553== HEAP SUMMARY:
==10553==     in use at exit: 3,113,552 bytes in 68,985 blocks
==10553==   total heap usage: 1,603,358 allocs, 1,534,373 frees, 129,692,691 bytes allocated
==10553== 
==10551== Searching for pointers to 69,536 not-freed blocks
==10552== Searching for pointers to 69,022 not-freed blocks
--10551--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10552--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10551--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10552--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10552--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10551--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10552--   Scanning root segment: 0x4037000..0x403afff (16384)
--10551--   Scanning root segment: 0x4037000..0x403efff (32768)
--10552--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10552--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10552--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10552--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10551--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10552--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10552--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10551--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10552--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10551--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10552--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10552--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10551--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10552--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10551--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10552--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10551--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10552--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10552--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10551--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10551--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10552--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10551--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10551--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10551--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10551--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10552--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10552--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10551--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10552--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10551--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10551--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10551--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10551--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10552--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10551--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10552--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10551--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10552--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10551--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10552--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10551--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10552--   Scanning root segment: 0x701a000..0x701afff (4096)
--10551--   Scanning root segment: 0x701a000..0x701afff (4096)
--10551--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10552--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10551--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10552--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10552--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10551--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10552--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10551--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10551--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10552--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10551--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10552--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10551--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10552--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10551--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10552--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10551--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10551--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10552--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10552--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10553== Searching for pointers to 68,985 not-freed blocks
--10553--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10553--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10553--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10553--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10553--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10553--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10553--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10553--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10553--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10553--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10553--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10553--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10553--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10553--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10553--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10553--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10553--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10553--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10553--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10553--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10553--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10553--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10553--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10553--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10553--   Scanning root segment: 0x701a000..0x701afff (4096)
--10553--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10553--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10553--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10553--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10553--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10553--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10553--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10553--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10553--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10553--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10552== Checked 4,791,560 bytes
==10552== 
==10551== Checked 4,839,360 bytes
==10551== 
==10553== Checked 4,767,560 bytes
==10553== 
==10552== LEAK SUMMARY:
==10551== LEAK SUMMARY:
==10552==    definitely lost: 2,205 bytes in 14 blocks
==10551==    definitely lost: 2,221 bytes in 14 blocks
==10552==    indirectly lost: 6,756 bytes in 7 blocks
==10551==    indirectly lost: 6,796 bytes in 9 blocks
==10552==      possibly lost: 0 bytes in 0 blocks
==10551==      possibly lost: 0 bytes in 0 blocks
==10552==    still reachable: 3,106,741 bytes in 69,001 blocks
==10551==    still reachable: 3,128,369 bytes in 69,513 blocks
==10552==         suppressed: 0 bytes in 0 blocks
==10551==         suppressed: 0 bytes in 0 blocks
==10552== Rerun with --leak-check=full to see details of leaked memory
==10551== Rerun with --leak-check=full to see details of leaked memory
==10552== 
==10551== 
==10552== Use --track-origins=yes to see where uninitialised values come from
==10551== Use --track-origins=yes to see where uninitialised values come from
==10552== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10552== 
==10551== 
==10552== 1 errors in context 1 of 2:
==10551== 1 errors in context 1 of 2:
==10552== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10551== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10552==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10551==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10552==    by 0x488CD0: stringsubst (subst.c:301)
==10551==    by 0x488CD0: stringsubst (subst.c:301)
==10552==    by 0x48801B: prefork (subst.c:77)
==10551==    by 0x48801B: prefork (subst.c:77)
==10552==    by 0x42B318: execcmd (exec.c:2619)
==10551==    by 0x42B318: execcmd (exec.c:2619)
==10552==    by 0x428CA0: execpline2 (exec.c:1697)
==10551==    by 0x428CA0: execpline2 (exec.c:1697)
==10552==    by 0x427FD2: execpline (exec.c:1484)
==10551==    by 0x427FD2: execpline (exec.c:1484)
==10552==    by 0x427756: execlist (exec.c:1267)
==10551==    by 0x427756: execlist (exec.c:1267)
==10552==    by 0x42717C: execode (exec.c:1073)
==10551==    by 0x42717C: execode (exec.c:1073)
==10552==    by 0x431299: runshfunc (exec.c:5040)
==10551==    by 0x431299: runshfunc (exec.c:5040)
==10552==    by 0x430E76: doshfunc (exec.c:4920)
==10551==    by 0x430E76: doshfunc (exec.c:4920)
==10552==    by 0x4302FB: execshfunc (exec.c:4557)
==10551==    by 0x4302FB: execshfunc (exec.c:4557)
==10552==    by 0x42D8C1: execcmd (exec.c:3373)
==10551==    by 0x42D8C1: execcmd (exec.c:3373)
==10552== 
==10551== 
==10552== 
==10551== 
==10552== 2 errors in context 2 of 2:
==10551== 2 errors in context 2 of 2:
==10552== Conditional jump or move depends on uninitialised value(s)
==10551== Conditional jump or move depends on uninitialised value(s)
==10552==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10551==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10552==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10551==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10552==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10551==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10552==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10551==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10552==    by 0x42D8E9: execcmd (exec.c:3378)
==10551==    by 0x42D8E9: execcmd (exec.c:3378)
==10552==    by 0x428CA0: execpline2 (exec.c:1697)
==10551==    by 0x428CA0: execpline2 (exec.c:1697)
==10552==    by 0x427FD2: execpline (exec.c:1484)
==10551==    by 0x427FD2: execpline (exec.c:1484)
==10552==    by 0x42779A: execlist (exec.c:1275)
==10551==    by 0x42779A: execlist (exec.c:1275)
==10552==    by 0x42717C: execode (exec.c:1073)
==10551==    by 0x42717C: execode (exec.c:1073)
==10552==    by 0x431299: runshfunc (exec.c:5040)
==10551==    by 0x431299: runshfunc (exec.c:5040)
==10552==    by 0x430E76: doshfunc (exec.c:4920)
==10551==    by 0x430E76: doshfunc (exec.c:4920)
==10552==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10551==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10552== 
==10551== 
==10552== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10553== LEAK SUMMARY:
==10553==    definitely lost: 2,205 bytes in 14 blocks
==10553==    indirectly lost: 6,756 bytes in 7 blocks
==10553==      possibly lost: 0 bytes in 0 blocks
==10553==    still reachable: 3,104,591 bytes in 68,964 blocks
==10553==         suppressed: 0 bytes in 0 blocks
==10553== Rerun with --leak-check=full to see details of leaked memory
==10553== 
==10553== Use --track-origins=yes to see where uninitialised values come from
==10553== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10553== 
==10553== 1 errors in context 1 of 2:
==10553== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10553==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10553==    by 0x488CD0: stringsubst (subst.c:301)
==10553==    by 0x48801B: prefork (subst.c:77)
==10553==    by 0x42B318: execcmd (exec.c:2619)
==10553==    by 0x428CA0: execpline2 (exec.c:1697)
==10553==    by 0x427FD2: execpline (exec.c:1484)
==10553==    by 0x427756: execlist (exec.c:1267)
==10553==    by 0x42717C: execode (exec.c:1073)
==10553==    by 0x431299: runshfunc (exec.c:5040)
==10553==    by 0x430E76: doshfunc (exec.c:4920)
==10553==    by 0x4302FB: execshfunc (exec.c:4557)
==10553==    by 0x42D8C1: execcmd (exec.c:3373)
==10553== 
==10553== 
==10553== 2 errors in context 2 of 2:
==10553== Conditional jump or move depends on uninitialised value(s)
==10553==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10553==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10553==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10553==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10553==    by 0x42D8E9: execcmd (exec.c:3378)
==10553==    by 0x428CA0: execpline2 (exec.c:1697)
==10553==    by 0x427FD2: execpline (exec.c:1484)
==10553==    by 0x42779A: execlist (exec.c:1275)
==10553==    by 0x42717C: execode (exec.c:1073)
==10553==    by 0x431299: runshfunc (exec.c:5040)
==10553==    by 0x430E76: doshfunc (exec.c:4920)
==10553==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10553== 
==10553== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10550== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10550-by-pythonnut-on-???
==10550== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10550-by-pythonnut-on-???
==10550== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10550-by-pythonnut-on-???
==10550== 
==10550== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10550== don't want to do, unless you know exactly what you're doing,
==10550== or are doing some strange experiment):
==10550==   /usr/lib/valgrind/../../bin/vgdb --pid=10550 ...command...
==10550== 
==10550== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10550==   /path/to/gdb ./zsh
==10550== and then give GDB the following command
==10550==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10550
==10550== --pid is optional if only one valgrind process is running
==10550== 
--10550-- Caught __NR_exit; running __libc_freeres()
==10556== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10556-by-pythonnut-on-???
==10556== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10556-by-pythonnut-on-???
==10556== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10556-by-pythonnut-on-???
==10556== 
==10556== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10556== don't want to do, unless you know exactly what you're doing,
==10556== or are doing some strange experiment):
==10556==   /usr/lib/valgrind/../../bin/vgdb --pid=10556 ...command...
==10556== 
==10556== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10556==   /path/to/gdb ./zsh
==10556== and then give GDB the following command
==10556==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10556
==10556== --pid is optional if only one valgrind process is running
==10556== 
--10557-- Caught __NR_exit; running __libc_freeres()
--10555-- Caught __NR_exit; running __libc_freeres()
--10550-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10555== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10555-by-pythonnut-on-???
==10555== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10555-by-pythonnut-on-???
==10555== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10555-by-pythonnut-on-???
==10555== 
==10555== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10555== don't want to do, unless you know exactly what you're doing,
==10555== or are doing some strange experiment):
==10555==   /usr/lib/valgrind/../../bin/vgdb --pid=10555 ...command...
==10555== 
==10555== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10555==   /path/to/gdb ./zsh
==10555== and then give GDB the following command
==10555==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10555
==10555== --pid is optional if only one valgrind process is running
==10555== 
==10557== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10557-by-pythonnut-on-???
==10557== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10557-by-pythonnut-on-???
==10557== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10557-by-pythonnut-on-???
==10557== 
==10557== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10557== don't want to do, unless you know exactly what you're doing,
==10557== or are doing some strange experiment):
==10557==   /usr/lib/valgrind/../../bin/vgdb --pid=10557 ...command...
==10557== 
==10557== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10557==   /path/to/gdb ./zsh
==10557== and then give GDB the following command
==10557==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10557
==10557== --pid is optional if only one valgrind process is running
==10557== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
==10550== 
==10550== HEAP SUMMARY:
==10550==     in use at exit: 3,115,638 bytes in 69,019 blocks
==10550==   total heap usage: 1,603,360 allocs, 1,534,341 frees, 129,800,266 bytes allocated
==10550== 
--10555-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10557-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10555== 
==10555== HEAP SUMMARY:
==10555==     in use at exit: 3,113,456 bytes in 68,985 blocks
==10555==   total heap usage: 1,603,338 allocs, 1,534,353 frees, 129,690,461 bytes allocated
==10555== 
==10557== 
==10557== HEAP SUMMARY:
==10557==     in use at exit: 3,137,636 bytes in 69,541 blocks
==10557==   total heap usage: 1,597,489 allocs, 1,527,948 frees, 129,077,370 bytes allocated
==10557== 
==10550== Searching for pointers to 69,019 not-freed blocks
--10550--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10550--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10550--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10550--   Scanning root segment: 0x4037000..0x403afff (16384)
--10550--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10550--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10550--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10550--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10550--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10550--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10550--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10550--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10550--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10550--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10550--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10550--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10550--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10550--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10550--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10550--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10550--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10550--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10550--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10550--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10550--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10550--   Scanning root segment: 0x701a000..0x701afff (4096)
--10550--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10550--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10550--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10550--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10550--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10550--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10550--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10550--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10550--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10550--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10555== Searching for pointers to 68,985 not-freed blocks
--10555--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10555--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10555--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10555--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10555--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10555--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10555--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10555--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10555--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10555--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10555--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10555--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10555--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10555--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10555--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10555--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10555--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10555--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10555--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10555--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10555--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10555--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10555--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10555--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10555--   Scanning root segment: 0x701a000..0x701afff (4096)
--10555--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10555--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10555--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10555--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10555--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10555--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10555--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10555--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10555--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10555--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10557== Searching for pointers to 69,541 not-freed blocks
--10557--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10557--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10557--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10557--   Scanning root segment: 0x4037000..0x403efff (32768)
--10557--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10557--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10557--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10557--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10557--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10557--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10557--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10557--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10557--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10557--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10557--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10557--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10557--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10557--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10557--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10557--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10557--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10557--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10557--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10557--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10557--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10557--   Scanning root segment: 0x701a000..0x701afff (4096)
--10557--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10557--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10557--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10557--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10557--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10557--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10557--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10557--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10557--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10557--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10550== Checked 4,790,872 bytes
==10550== 
==10555== Checked 4,788,432 bytes
==10555== 
==10550== LEAK SUMMARY:
==10550==    definitely lost: 2,205 bytes in 14 blocks
==10550==    indirectly lost: 6,756 bytes in 7 blocks
==10550==      possibly lost: 0 bytes in 0 blocks
==10550==    still reachable: 3,106,677 bytes in 68,998 blocks
==10550==         suppressed: 0 bytes in 0 blocks
==10550== Rerun with --leak-check=full to see details of leaked memory
==10550== 
==10550== Use --track-origins=yes to see where uninitialised values come from
==10550== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10550== 
==10550== 1 errors in context 1 of 2:
==10550== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10550==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10550==    by 0x488CD0: stringsubst (subst.c:301)
==10550==    by 0x48801B: prefork (subst.c:77)
==10550==    by 0x42B318: execcmd (exec.c:2619)
==10550==    by 0x428CA0: execpline2 (exec.c:1697)
==10550==    by 0x427FD2: execpline (exec.c:1484)
==10550==    by 0x427756: execlist (exec.c:1267)
==10550==    by 0x42717C: execode (exec.c:1073)
==10550==    by 0x431299: runshfunc (exec.c:5040)
==10550==    by 0x430E76: doshfunc (exec.c:4920)
==10550==    by 0x4302FB: execshfunc (exec.c:4557)
==10550==    by 0x42D8C1: execcmd (exec.c:3373)
==10550== 
==10550== 
==10550== 2 errors in context 2 of 2:
==10550== Conditional jump or move depends on uninitialised value(s)
==10550==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10550==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10550==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10550==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10550==    by 0x42D8E9: execcmd (exec.c:3378)
==10550==    by 0x428CA0: execpline2 (exec.c:1697)
==10550==    by 0x427FD2: execpline (exec.c:1484)
==10550==    by 0x42779A: execlist (exec.c:1275)
==10550==    by 0x42717C: execode (exec.c:1073)
==10550==    by 0x431299: runshfunc (exec.c:5040)
==10550==    by 0x430E76: doshfunc (exec.c:4920)
==10550==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10550== 
==10550== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10557== Checked 4,840,240 bytes
==10557== 
==10555== LEAK SUMMARY:
==10555==    definitely lost: 2,205 bytes in 14 blocks
==10555==    indirectly lost: 6,756 bytes in 7 blocks
==10555==      possibly lost: 0 bytes in 0 blocks
==10555==    still reachable: 3,104,495 bytes in 68,964 blocks
==10555==         suppressed: 0 bytes in 0 blocks
==10555== Rerun with --leak-check=full to see details of leaked memory
==10555== 
==10555== Use --track-origins=yes to see where uninitialised values come from
==10555== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10555== 
==10555== 1 errors in context 1 of 2:
==10555== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10555==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10555==    by 0x488CD0: stringsubst (subst.c:301)
==10555==    by 0x48801B: prefork (subst.c:77)
==10555==    by 0x42B318: execcmd (exec.c:2619)
==10555==    by 0x428CA0: execpline2 (exec.c:1697)
==10555==    by 0x427FD2: execpline (exec.c:1484)
==10555==    by 0x427756: execlist (exec.c:1267)
==10555==    by 0x42717C: execode (exec.c:1073)
==10555==    by 0x431299: runshfunc (exec.c:5040)
==10555==    by 0x430E76: doshfunc (exec.c:4920)
==10555==    by 0x4302FB: execshfunc (exec.c:4557)
==10555==    by 0x42D8C1: execcmd (exec.c:3373)
==10555== 
==10555== 
==10555== 2 errors in context 2 of 2:
==10555== Conditional jump or move depends on uninitialised value(s)
==10555==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10555==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10555==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10555==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10555==    by 0x42D8E9: execcmd (exec.c:3378)
==10555==    by 0x428CA0: execpline2 (exec.c:1697)
==10555==    by 0x427FD2: execpline (exec.c:1484)
==10555==    by 0x42779A: execlist (exec.c:1275)
==10555==    by 0x42717C: execode (exec.c:1073)
==10555==    by 0x431299: runshfunc (exec.c:5040)
==10555==    by 0x430E76: doshfunc (exec.c:4920)
==10555==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10555== 
==10555== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10559== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10559-by-pythonnut-on-???
==10559== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10559-by-pythonnut-on-???
==10559== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10559-by-pythonnut-on-???
==10559== 
==10559== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10559== don't want to do, unless you know exactly what you're doing,
==10559== or are doing some strange experiment):
==10559==   /usr/lib/valgrind/../../bin/vgdb --pid=10559 ...command...
==10559== 
==10559== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10559==   /path/to/gdb ./zsh
==10559== and then give GDB the following command
==10559==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10559
==10559== --pid is optional if only one valgrind process is running
==10559== 
--10559-- Caught __NR_exit; running __libc_freeres()
==10557== LEAK SUMMARY:
==10557==    definitely lost: 2,221 bytes in 14 blocks
==10557==    indirectly lost: 6,796 bytes in 9 blocks
==10557==      possibly lost: 0 bytes in 0 blocks
==10557==    still reachable: 3,128,619 bytes in 69,518 blocks
==10557==         suppressed: 0 bytes in 0 blocks
==10557== Rerun with --leak-check=full to see details of leaked memory
==10557== 
==10557== Use --track-origins=yes to see where uninitialised values come from
==10557== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10557== 
==10557== 1 errors in context 1 of 2:
==10557== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10557==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10557==    by 0x488CD0: stringsubst (subst.c:301)
==10557==    by 0x48801B: prefork (subst.c:77)
==10557==    by 0x42B318: execcmd (exec.c:2619)
==10557==    by 0x428CA0: execpline2 (exec.c:1697)
==10557==    by 0x427FD2: execpline (exec.c:1484)
==10557==    by 0x427756: execlist (exec.c:1267)
==10557==    by 0x42717C: execode (exec.c:1073)
==10557==    by 0x431299: runshfunc (exec.c:5040)
==10557==    by 0x430E76: doshfunc (exec.c:4920)
==10557==    by 0x4302FB: execshfunc (exec.c:4557)
==10557==    by 0x42D8C1: execcmd (exec.c:3373)
==10557== 
==10557== 
==10557== 2 errors in context 2 of 2:
==10557== Conditional jump or move depends on uninitialised value(s)
==10557==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10557==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10557==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10557==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10557==    by 0x42D8E9: execcmd (exec.c:3378)
==10557==    by 0x428CA0: execpline2 (exec.c:1697)
==10557==    by 0x427FD2: execpline (exec.c:1484)
==10557==    by 0x42779A: execlist (exec.c:1275)
==10557==    by 0x42717C: execode (exec.c:1073)
==10557==    by 0x431299: runshfunc (exec.c:5040)
==10557==    by 0x430E76: doshfunc (exec.c:4920)
==10557==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10557== 
==10557== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10556-- Caught __NR_exit; running __libc_freeres()
==10560== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10560-by-pythonnut-on-???
==10560== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10560-by-pythonnut-on-???
==10560== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10560-by-pythonnut-on-???
==10560== 
==10560== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10560== don't want to do, unless you know exactly what you're doing,
==10560== or are doing some strange experiment):
==10560==   /usr/lib/valgrind/../../bin/vgdb --pid=10560 ...command...
==10560== 
==10560== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10560==   /path/to/gdb ./zsh
==10560== and then give GDB the following command
==10560==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10560
==10560== --pid is optional if only one valgrind process is running
==10560== 
--10559-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10559== 
--10560-- Caught __NR_exit; running __libc_freeres()
==10559== HEAP SUMMARY:
==10559==     in use at exit: 3,115,642 bytes in 69,019 blocks
==10559==   total heap usage: 1,603,376 allocs, 1,534,357 frees, 129,805,262 bytes allocated
==10559== 
--10556-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10556== 
==10556== HEAP SUMMARY:
==10556==     in use at exit: 3,137,412 bytes in 69,538 blocks
==10556==   total heap usage: 1,597,492 allocs, 1,527,954 frees, 129,077,946 bytes allocated
==10556== 
--10560-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10559== Searching for pointers to 69,019 not-freed blocks
--10559--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10559--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10559--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10559--   Scanning root segment: 0x4037000..0x403afff (16384)
--10559--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10559--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10559--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10559--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10559--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10559--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10559--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10559--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10559--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10559--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10559--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10559--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10559--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10559--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10559--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10559--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10559--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10559--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10559--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10559--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10559--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10559--   Scanning root segment: 0x701a000..0x701afff (4096)
--10559--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10559--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10559--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10559--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10559--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10559--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10559--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10559--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10559--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10559--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10560== 
==10560== HEAP SUMMARY:
==10560==     in use at exit: 3,113,484 bytes in 68,986 blocks
==10560==   total heap usage: 1,603,351 allocs, 1,534,365 frees, 129,693,148 bytes allocated
==10560== 
==10556== Searching for pointers to 69,538 not-freed blocks
--10556--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10556--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10556--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10556--   Scanning root segment: 0x4037000..0x403efff (32768)
--10556--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10556--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10556--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10556--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10556--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10556--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10556--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10556--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10556--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10556--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10556--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10556--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10556--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10556--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10556--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10556--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10556--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10556--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10556--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10556--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10556--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10556--   Scanning root segment: 0x701a000..0x701afff (4096)
--10556--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10556--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10556--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10556--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10556--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10556--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10556--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10556--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10556--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10556--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10560== Searching for pointers to 68,986 not-freed blocks
--10560--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10560--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10560--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10560--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10560--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10560--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10560--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10560--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10560--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10560--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10560--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10560--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10560--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10560--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10560--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10560--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10560--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10560--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10560--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10560--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10560--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10560--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10560--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10560--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10560--   Scanning root segment: 0x701a000..0x701afff (4096)
--10560--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10560--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10560--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10560--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10560--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10560--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10560--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10560--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10560--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10560--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10559== Checked 4,790,880 bytes
==10559== 
==10556== Checked 4,839,384 bytes
==10556== 
==10559== LEAK SUMMARY:
==10559==    definitely lost: 2,205 bytes in 14 blocks
==10559==    indirectly lost: 6,756 bytes in 7 blocks
==10559==      possibly lost: 0 bytes in 0 blocks
==10559==    still reachable: 3,106,681 bytes in 68,998 blocks
==10559==         suppressed: 0 bytes in 0 blocks
==10559== Rerun with --leak-check=full to see details of leaked memory
==10559== 
==10559== Use --track-origins=yes to see where uninitialised values come from
==10559== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10559== 
==10559== 1 errors in context 1 of 2:
==10559== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10559==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10559==    by 0x488CD0: stringsubst (subst.c:301)
==10559==    by 0x48801B: prefork (subst.c:77)
==10559==    by 0x42B318: execcmd (exec.c:2619)
==10559==    by 0x428CA0: execpline2 (exec.c:1697)
==10559==    by 0x427FD2: execpline (exec.c:1484)
==10559==    by 0x427756: execlist (exec.c:1267)
==10559==    by 0x42717C: execode (exec.c:1073)
==10559==    by 0x431299: runshfunc (exec.c:5040)
==10559==    by 0x430E76: doshfunc (exec.c:4920)
==10559==    by 0x4302FB: execshfunc (exec.c:4557)
==10559==    by 0x42D8C1: execcmd (exec.c:3373)
==10559== 
==10559== 
==10559== 2 errors in context 2 of 2:
==10559== Conditional jump or move depends on uninitialised value(s)
==10559==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10559==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10559==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10559==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10559==    by 0x42D8E9: execcmd (exec.c:3378)
==10559==    by 0x428CA0: execpline2 (exec.c:1697)
==10559==    by 0x427FD2: execpline (exec.c:1484)
==10559==    by 0x42779A: execlist (exec.c:1275)
==10559==    by 0x42717C: execode (exec.c:1073)
==10559==    by 0x431299: runshfunc (exec.c:5040)
==10559==    by 0x430E76: doshfunc (exec.c:4920)
==10559==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10559== 
==10559== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10563== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10563-by-pythonnut-on-???
==10563== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10563-by-pythonnut-on-???
==10563== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10563-by-pythonnut-on-???
==10563== 
==10563== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10563== don't want to do, unless you know exactly what you're doing,
==10563== or are doing some strange experiment):
==10563==   /usr/lib/valgrind/../../bin/vgdb --pid=10563 ...command...
==10563== 
==10563== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10563==   /path/to/gdb ./zsh
==10563== and then give GDB the following command
==10563==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10563
==10563== --pid is optional if only one valgrind process is running
==10563== 
==10560== Checked 4,787,944 bytes
==10560== 
==10556== LEAK SUMMARY:
==10556==    definitely lost: 2,221 bytes in 14 blocks
==10556==    indirectly lost: 6,796 bytes in 9 blocks
==10556==      possibly lost: 0 bytes in 0 blocks
==10556==    still reachable: 3,128,395 bytes in 69,515 blocks
==10556==         suppressed: 0 bytes in 0 blocks
==10556== Rerun with --leak-check=full to see details of leaked memory
==10556== 
==10556== Use --track-origins=yes to see where uninitialised values come from
==10556== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10556== 
==10556== 1 errors in context 1 of 2:
==10556== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10556==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10556==    by 0x488CD0: stringsubst (subst.c:301)
==10556==    by 0x48801B: prefork (subst.c:77)
==10556==    by 0x42B318: execcmd (exec.c:2619)
==10556==    by 0x428CA0: execpline2 (exec.c:1697)
==10556==    by 0x427FD2: execpline (exec.c:1484)
==10556==    by 0x427756: execlist (exec.c:1267)
==10556==    by 0x42717C: execode (exec.c:1073)
==10556==    by 0x431299: runshfunc (exec.c:5040)
==10556==    by 0x430E76: doshfunc (exec.c:4920)
==10556==    by 0x4302FB: execshfunc (exec.c:4557)
==10556==    by 0x42D8C1: execcmd (exec.c:3373)
==10556== 
==10556== 
==10556== 2 errors in context 2 of 2:
==10556== Conditional jump or move depends on uninitialised value(s)
==10556==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10556==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10556==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10556==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10556==    by 0x42D8E9: execcmd (exec.c:3378)
==10556==    by 0x428CA0: execpline2 (exec.c:1697)
==10556==    by 0x427FD2: execpline (exec.c:1484)
==10556==    by 0x42779A: execlist (exec.c:1275)
==10556==    by 0x42717C: execode (exec.c:1073)
==10556==    by 0x431299: runshfunc (exec.c:5040)
==10556==    by 0x430E76: doshfunc (exec.c:4920)
==10556==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10556== 
==10556== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10563-- Caught __NR_exit; running __libc_freeres()
--10414-- Caught __NR_exit; running __libc_freeres()
==10560== LEAK SUMMARY:
==10560==    definitely lost: 2,205 bytes in 14 blocks
==10560==    indirectly lost: 6,756 bytes in 7 blocks
==10560==      possibly lost: 0 bytes in 0 blocks
==10560==    still reachable: 3,104,523 bytes in 68,965 blocks
==10560==         suppressed: 0 bytes in 0 blocks
==10560== Rerun with --leak-check=full to see details of leaked memory
==10560== 
==10560== Use --track-origins=yes to see where uninitialised values come from
==10560== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10560== 
==10560== 1 errors in context 1 of 2:
==10560== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10560==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10560==    by 0x488CD0: stringsubst (subst.c:301)
==10560==    by 0x48801B: prefork (subst.c:77)
==10560==    by 0x42B318: execcmd (exec.c:2619)
==10560==    by 0x428CA0: execpline2 (exec.c:1697)
==10560==    by 0x427FD2: execpline (exec.c:1484)
==10560==    by 0x427756: execlist (exec.c:1267)
==10560==    by 0x42717C: execode (exec.c:1073)
==10560==    by 0x431299: runshfunc (exec.c:5040)
==10560==    by 0x430E76: doshfunc (exec.c:4920)
==10560==    by 0x4302FB: execshfunc (exec.c:4557)
==10560==    by 0x42D8C1: execcmd (exec.c:3373)
==10560== 
==10560== 
==10560== 2 errors in context 2 of 2:
==10560== Conditional jump or move depends on uninitialised value(s)
==10560==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10560==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10560==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10560==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10560==    by 0x42D8E9: execcmd (exec.c:3378)
==10560==    by 0x428CA0: execpline2 (exec.c:1697)
==10560==    by 0x427FD2: execpline (exec.c:1484)
==10560==    by 0x42779A: execlist (exec.c:1275)
==10560==    by 0x42717C: execode (exec.c:1073)
==10560==    by 0x431299: runshfunc (exec.c:5040)
==10560==    by 0x430E76: doshfunc (exec.c:4920)
==10560==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10560== 
==10560== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10563-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10563== 
==10563== HEAP SUMMARY:
==10563==     in use at exit: 3,115,641 bytes in 69,019 blocks
==10563==   total heap usage: 1,603,381 allocs, 1,534,362 frees, 129,807,375 bytes allocated
==10563== 
--10414-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10564-by-pythonnut-on-???
==10564== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10564-by-pythonnut-on-???
==10564== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10564-by-pythonnut-on-???
==10564== 
==10564== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10564== don't want to do, unless you know exactly what you're doing,
==10564== or are doing some strange experiment):
==10564==   /usr/lib/valgrind/../../bin/vgdb --pid=10564 ...command...
==10564== 
==10564== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10564==   /path/to/gdb ./zsh
==10564== and then give GDB the following command
==10564==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10564
==10564== --pid is optional if only one valgrind process is running
==10564== 
--10564-- Caught __NR_exit; running __libc_freeres()
==10414== 
==10563== Searching for pointers to 69,019 not-freed blocks
--10563--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==10414== HEAP SUMMARY:
==10414==     in use at exit: 3,133,478 bytes in 69,401 blocks
==10414==   total heap usage: 1,597,433 allocs, 1,528,032 frees, 129,078,344 bytes allocated
==10414== 
--10563--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10563--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10563--   Scanning root segment: 0x4037000..0x403afff (16384)
--10563--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10563--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10563--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10563--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10563--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10563--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10563--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10563--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10563--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10563--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10563--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10563--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10563--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10563--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10563--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10563--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10563--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10563--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10563--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10563--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10563--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10563--   Scanning root segment: 0x701a000..0x701afff (4096)
--10563--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10563--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10563--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10563--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10563--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10563--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10563--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10563--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10563--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10563--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10564-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== 
==10564== HEAP SUMMARY:
==10564==     in use at exit: 3,112,005 bytes in 68,926 blocks
==10564==   total heap usage: 1,603,321 allocs, 1,534,395 frees, 129,696,134 bytes allocated
==10564== 
==10414== Searching for pointers to 69,401 not-freed blocks
--10414--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10414--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10414--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10414--   Scanning root segment: 0x4037000..0x403afff (16384)
--10414--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10414--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10414--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10414--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10414--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10414--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10414--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10414--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10414--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10414--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10414--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10414--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10414--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10414--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10414--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10414--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10414--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10414--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10414--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10414--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10414--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10414--   Scanning root segment: 0x701a000..0x701afff (4096)
--10414--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10414--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10414--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10414--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10414--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10414--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10414--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10414--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10414--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10414--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10564== Searching for pointers to 68,926 not-freed blocks
--10564--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10564--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10564--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10564--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10564--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10564--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10564--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10564--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10564--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10564--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10564--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10564--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10564--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10564--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10564--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10564--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10564--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10564--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10564--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10564--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10564--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10564--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10564--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10564--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10564--   Scanning root segment: 0x701a000..0x701afff (4096)
--10564--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10564--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10564--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10564--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10564--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10564--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10564--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10564--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10564--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10564--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10563== Checked 4,790,880 bytes
==10563== 
==10563== LEAK SUMMARY:
==10563==    definitely lost: 2,205 bytes in 14 blocks
==10563==    indirectly lost: 6,756 bytes in 7 blocks
==10563==      possibly lost: 0 bytes in 0 blocks
==10563==    still reachable: 3,106,680 bytes in 68,998 blocks
==10563==         suppressed: 0 bytes in 0 blocks
==10563== Rerun with --leak-check=full to see details of leaked memory
==10563== 
==10563== Use --track-origins=yes to see where uninitialised values come from
==10563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10563== 
==10563== 1 errors in context 1 of 2:
==10563== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10563==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10563==    by 0x488CD0: stringsubst (subst.c:301)
==10563==    by 0x48801B: prefork (subst.c:77)
==10563==    by 0x42B318: execcmd (exec.c:2619)
==10563==    by 0x428CA0: execpline2 (exec.c:1697)
==10563==    by 0x427FD2: execpline (exec.c:1484)
==10563==    by 0x427756: execlist (exec.c:1267)
==10563==    by 0x42717C: execode (exec.c:1073)
==10563==    by 0x431299: runshfunc (exec.c:5040)
==10563==    by 0x430E76: doshfunc (exec.c:4920)
==10563==    by 0x4302FB: execshfunc (exec.c:4557)
==10563==    by 0x42D8C1: execcmd (exec.c:3373)
==10563== 
==10563== 
==10563== 2 errors in context 2 of 2:
==10563== Conditional jump or move depends on uninitialised value(s)
==10563==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10563==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10563==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10563==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10563==    by 0x42D8E9: execcmd (exec.c:3378)
==10563==    by 0x428CA0: execpline2 (exec.c:1697)
==10563==    by 0x427FD2: execpline (exec.c:1484)
==10563==    by 0x42779A: execlist (exec.c:1275)
==10563==    by 0x42717C: execode (exec.c:1073)
==10563==    by 0x431299: runshfunc (exec.c:5040)
==10563==    by 0x430E76: doshfunc (exec.c:4920)
==10563==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10414== Checked 4,816,336 bytes
==10563== 
==10414== 
==10563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10565-by-pythonnut-on-???
==10565== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10565-by-pythonnut-on-???
==10565== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10565-by-pythonnut-on-???
==10565== 
==10565== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10565== don't want to do, unless you know exactly what you're doing,
==10565== or are doing some strange experiment):
==10565==   /usr/lib/valgrind/../../bin/vgdb --pid=10565 ...command...
==10565== 
==10565== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10565==   /path/to/gdb ./zsh
==10565== and then give GDB the following command
==10565==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10565
==10565== --pid is optional if only one valgrind process is running
==10565== 
--10565-- Caught __NR_exit; running __libc_freeres()
==10414== LEAK SUMMARY:
==10414==    definitely lost: 2,221 bytes in 14 blocks
==10414==    indirectly lost: 6,796 bytes in 9 blocks
==10414==      possibly lost: 0 bytes in 0 blocks
==10414==    still reachable: 3,124,461 bytes in 69,378 blocks
==10414==         suppressed: 0 bytes in 0 blocks
==10414== Rerun with --leak-check=full to see details of leaked memory
==10414== 
==10414== Use --track-origins=yes to see where uninitialised values come from
==10414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10414== 
==10414== 1 errors in context 1 of 2:
==10414== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10414==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10414==    by 0x488CD0: stringsubst (subst.c:301)
==10414==    by 0x48801B: prefork (subst.c:77)
==10414==    by 0x42B318: execcmd (exec.c:2619)
==10414==    by 0x428CA0: execpline2 (exec.c:1697)
==10414==    by 0x427FD2: execpline (exec.c:1484)
==10414==    by 0x427756: execlist (exec.c:1267)
==10414==    by 0x42717C: execode (exec.c:1073)
==10414==    by 0x431299: runshfunc (exec.c:5040)
==10414==    by 0x430E76: doshfunc (exec.c:4920)
==10414==    by 0x4302FB: execshfunc (exec.c:4557)
==10414==    by 0x42D8C1: execcmd (exec.c:3373)
==10414== 
==10414== 
==10414== 2 errors in context 2 of 2:
==10414== Conditional jump or move depends on uninitialised value(s)
==10414==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10414==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10414==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10414==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10414==    by 0x42D8E9: execcmd (exec.c:3378)
==10414==    by 0x428CA0: execpline2 (exec.c:1697)
==10414==    by 0x427FD2: execpline (exec.c:1484)
==10414==    by 0x42779A: execlist (exec.c:1275)
==10414==    by 0x42717C: execode (exec.c:1073)
==10414==    by 0x431299: runshfunc (exec.c:5040)
==10414==    by 0x430E76: doshfunc (exec.c:4920)
==10414==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10414== 
==10414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10564== Checked 4,787,408 bytes
==10564== 
==10566== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10566-by-pythonnut-on-???
==10566== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10566-by-pythonnut-on-???
==10566== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10566-by-pythonnut-on-???
==10566== 
==10566== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10566== don't want to do, unless you know exactly what you're doing,
==10566== or are doing some strange experiment):
==10566==   /usr/lib/valgrind/../../bin/vgdb --pid=10566 ...command...
==10566== 
==10566== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10566==   /path/to/gdb ./zsh
==10566== and then give GDB the following command
==10566==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10566
==10566== --pid is optional if only one valgrind process is running
==10566== 
--10565-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== LEAK SUMMARY:
==10564==    definitely lost: 2,205 bytes in 14 blocks
==10564==    indirectly lost: 6,756 bytes in 7 blocks
==10564==      possibly lost: 0 bytes in 0 blocks
==10564==    still reachable: 3,103,044 bytes in 68,905 blocks
==10564==         suppressed: 0 bytes in 0 blocks
==10564== Rerun with --leak-check=full to see details of leaked memory
==10564== 
==10564== Use --track-origins=yes to see where uninitialised values come from
==10564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10564== 
==10564== 1 errors in context 1 of 2:
==10564== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10564==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10564==    by 0x488CD0: stringsubst (subst.c:301)
==10564==    by 0x48801B: prefork (subst.c:77)
==10564==    by 0x42B318: execcmd (exec.c:2619)
==10564==    by 0x428CA0: execpline2 (exec.c:1697)
==10564==    by 0x427FD2: execpline (exec.c:1484)
==10564==    by 0x427756: execlist (exec.c:1267)
==10564==    by 0x42717C: execode (exec.c:1073)
==10564==    by 0x431299: runshfunc (exec.c:5040)
==10564==    by 0x430E76: doshfunc (exec.c:4920)
==10564==    by 0x4302FB: execshfunc (exec.c:4557)
==10564==    by 0x42D8C1: execcmd (exec.c:3373)
==10564== 
==10564== 
==10564== 2 errors in context 2 of 2:
==10564== Conditional jump or move depends on uninitialised value(s)
==10564==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10564==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10564==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10564==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10564==    by 0x42D8E9: execcmd (exec.c:3378)
==10564==    by 0x428CA0: execpline2 (exec.c:1697)
==10564==    by 0x427FD2: execpline (exec.c:1484)
==10564==    by 0x42779A: execlist (exec.c:1275)
==10564==    by 0x42717C: execode (exec.c:1073)
==10564==    by 0x431299: runshfunc (exec.c:5040)
==10564==    by 0x430E76: doshfunc (exec.c:4920)
==10564==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10564== 
==10564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== 
==10565== HEAP SUMMARY:
==10565==     in use at exit: 3,115,640 bytes in 69,019 blocks
==10565==   total heap usage: 1,603,386 allocs, 1,534,367 frees, 129,809,488 bytes allocated
==10565== 
client request: code 4d430005,  addr 0xFFEFE8AAC,  len 4
==10568== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10568-by-pythonnut-on-???
==10568== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10568-by-pythonnut-on-???
==10568== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10568-by-pythonnut-on-???
==10568== 
==10568== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10568== don't want to do, unless you know exactly what you're doing,
==10568== or are doing some strange experiment):
==10568==   /usr/lib/valgrind/../../bin/vgdb --pid=10568 ...command...
==10568== 
==10568== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10568==   /path/to/gdb ./zsh
==10568== and then give GDB the following command
==10568==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10568
==10568== --pid is optional if only one valgrind process is running
==10568== 
==10565== Searching for pointers to 69,019 not-freed blocks
--10565--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10565--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10565--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10565--   Scanning root segment: 0x4037000..0x403afff (16384)
--10565--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10565--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10565--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10565--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10565--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10565--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10565--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10565--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10565--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10565--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10565--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10565--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10565--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10565--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10567-- Caught __NR_exit; running __libc_freeres()
--10565--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10565--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10565--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10565--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10565--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10565--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10565--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10565--   Scanning root segment: 0x701a000..0x701afff (4096)
--10565--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10565--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10565--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10565--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10565--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10565--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10565--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10565--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10565--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10565--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10567== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10567-by-pythonnut-on-???
==10567== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10567-by-pythonnut-on-???
==10567== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10567-by-pythonnut-on-???
==10567== 
==10567== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10567== don't want to do, unless you know exactly what you're doing,
==10567== or are doing some strange experiment):
==10567==   /usr/lib/valgrind/../../bin/vgdb --pid=10567 ...command...
==10567== 
==10567== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10567==   /path/to/gdb ./zsh
==10567== and then give GDB the following command
==10567==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10567
==10567== --pid is optional if only one valgrind process is running
==10567== 
--10570-- Caught __NR_exit; running __libc_freeres()
--10567-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10570== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10570-by-pythonnut-on-???
==10570== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10570-by-pythonnut-on-???
==10570== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10570-by-pythonnut-on-???
==10570== 
==10570== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10570== don't want to do, unless you know exactly what you're doing,
==10570== or are doing some strange experiment):
==10570==   /usr/lib/valgrind/../../bin/vgdb --pid=10570 ...command...
==10570== 
==10570== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10570==   /path/to/gdb ./zsh
==10570== and then give GDB the following command
==10570==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10570
==10570== --pid is optional if only one valgrind process is running
==10570== 
==10567== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==10567== HEAP SUMMARY:
==10567==     in use at exit: 3,135,462 bytes in 69,472 blocks
==10567==   total heap usage: 1,597,317 allocs, 1,527,845 frees, 129,034,519 bytes allocated
==10567== 
--10570-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10570== 
==10570== HEAP SUMMARY:
==10570==     in use at exit: 3,124,237 bytes in 69,166 blocks
==10570==   total heap usage: 1,603,713 allocs, 1,534,547 frees, 129,728,569 bytes allocated
==10570== 
==10567== Searching for pointers to 69,472 not-freed blocks
--10567--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10567--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10567--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10567--   Scanning root segment: 0x4037000..0x403afff (16384)
--10567--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10567--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10567--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10567--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10567--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10567--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10567--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10567--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10567--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10567--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10567--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10567--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10567--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10567--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10567--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10567--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10567--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10567--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10567--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10567--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10567--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10567--   Scanning root segment: 0x701a000..0x701afff (4096)
--10567--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10567--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10567--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10567--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10567--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10567--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10567--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10567--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10567--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10567--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10570== Searching for pointers to 69,166 not-freed blocks
--10570--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10570--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10570--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10570--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10570--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10570--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10570--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10570--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10570--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10570--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10570--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10570--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10570--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10570--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10570--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10570--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10570--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10570--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10570--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10570--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10570--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10570--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10570--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10570--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10570--   Scanning root segment: 0x701a000..0x701afff (4096)
--10570--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10570--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10570--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10570--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10570--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10570--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10570--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10570--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10570--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10570--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10565== Checked 4,790,880 bytes
==10565== 
==10565== LEAK SUMMARY:
==10565==    definitely lost: 2,205 bytes in 14 blocks
==10565==    indirectly lost: 6,756 bytes in 7 blocks
==10565==      possibly lost: 0 bytes in 0 blocks
==10565==    still reachable: 3,106,679 bytes in 68,998 blocks
==10565==         suppressed: 0 bytes in 0 blocks
==10565== Rerun with --leak-check=full to see details of leaked memory
==10565== 
==10565== Use --track-origins=yes to see where uninitialised values come from
==10565== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== 
==10565== 1 errors in context 1 of 2:
==10565== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10565==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10565==    by 0x488CD0: stringsubst (subst.c:301)
==10565==    by 0x48801B: prefork (subst.c:77)
==10565==    by 0x42B318: execcmd (exec.c:2619)
==10565==    by 0x428CA0: execpline2 (exec.c:1697)
==10565==    by 0x427FD2: execpline (exec.c:1484)
==10565==    by 0x427756: execlist (exec.c:1267)
==10565==    by 0x42717C: execode (exec.c:1073)
==10565==    by 0x431299: runshfunc (exec.c:5040)
==10565==    by 0x430E76: doshfunc (exec.c:4920)
==10565==    by 0x4302FB: execshfunc (exec.c:4557)
==10565==    by 0x42D8C1: execcmd (exec.c:3373)
==10565== 
==10565== 
==10565== 2 errors in context 2 of 2:
==10565== Conditional jump or move depends on uninitialised value(s)
==10565==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10565==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10565==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10565==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10565==    by 0x42D8E9: execcmd (exec.c:3378)
==10565==    by 0x428CA0: execpline2 (exec.c:1697)
==10565==    by 0x427FD2: execpline (exec.c:1484)
==10565==    by 0x42779A: execlist (exec.c:1275)
==10565==    by 0x42717C: execode (exec.c:1073)
==10565==    by 0x431299: runshfunc (exec.c:5040)
==10565==    by 0x430E76: doshfunc (exec.c:4920)
==10565==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10565== 
==10565== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10572-by-pythonnut-on-???
==10572== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10572-by-pythonnut-on-???
==10572== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10572-by-pythonnut-on-???
==10572== 
==10572== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10572== don't want to do, unless you know exactly what you're doing,
==10572== or are doing some strange experiment):
==10572==   /usr/lib/valgrind/../../bin/vgdb --pid=10572 ...command...
==10572== 
==10572== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10572==   /path/to/gdb ./zsh
==10572== and then give GDB the following command
==10572==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10572
==10572== --pid is optional if only one valgrind process is running
==10572== 
--10572-- Caught __NR_exit; running __libc_freeres()
--10572-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10567== Checked 4,820,120 bytes
==10567== 
==10572== 
==10572== HEAP SUMMARY:
==10572==     in use at exit: 3,115,639 bytes in 69,019 blocks
==10572==   total heap usage: 1,603,391 allocs, 1,534,372 frees, 129,811,601 bytes allocated
==10572== 
==10570== Checked 4,785,672 bytes
==10570== 
==10567== LEAK SUMMARY:
==10567==    definitely lost: 2,221 bytes in 14 blocks
==10567==    indirectly lost: 6,796 bytes in 9 blocks
==10567==      possibly lost: 0 bytes in 0 blocks
==10567==    still reachable: 3,126,445 bytes in 69,449 blocks
==10567==         suppressed: 0 bytes in 0 blocks
==10567== Rerun with --leak-check=full to see details of leaked memory
==10567== 
==10567== Use --track-origins=yes to see where uninitialised values come from
==10567== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10567== 
==10567== 1 errors in context 1 of 2:
==10567== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10567==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10567==    by 0x488CD0: stringsubst (subst.c:301)
==10567==    by 0x48801B: prefork (subst.c:77)
==10567==    by 0x42B318: execcmd (exec.c:2619)
==10567==    by 0x428CA0: execpline2 (exec.c:1697)
==10567==    by 0x427FD2: execpline (exec.c:1484)
==10567==    by 0x427756: execlist (exec.c:1267)
==10567==    by 0x42717C: execode (exec.c:1073)
==10567==    by 0x431299: runshfunc (exec.c:5040)
==10567==    by 0x430E76: doshfunc (exec.c:4920)
==10567==    by 0x4302FB: execshfunc (exec.c:4557)
==10567==    by 0x42D8C1: execcmd (exec.c:3373)
==10567== 
==10567== 
==10567== 2 errors in context 2 of 2:
==10567== Conditional jump or move depends on uninitialised value(s)
==10567==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10567==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10567==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10567==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10567==    by 0x42D8E9: execcmd (exec.c:3378)
==10567==    by 0x428CA0: execpline2 (exec.c:1697)
==10567==    by 0x427FD2: execpline (exec.c:1484)
==10567==    by 0x42779A: execlist (exec.c:1275)
==10567==    by 0x42717C: execode (exec.c:1073)
==10567==    by 0x431299: runshfunc (exec.c:5040)
==10567==    by 0x430E76: doshfunc (exec.c:4920)
==10567==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10567== 
==10567== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== Searching for pointers to 69,019 not-freed blocks
--10572--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10572--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10572--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10572--   Scanning root segment: 0x4037000..0x403afff (16384)
--10572--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10572--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10572--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10572--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10572--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10572--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10572--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10572--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10572--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10572--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10572--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10572--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10572--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10572--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10572--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10572--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10572--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10572--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10572--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10572--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10572--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10572--   Scanning root segment: 0x701a000..0x701afff (4096)
--10572--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==10570== LEAK SUMMARY:
--10572--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
==10570==    definitely lost: 2,205 bytes in 14 blocks
==10570==    indirectly lost: 6,756 bytes in 7 blocks
==10570==      possibly lost: 0 bytes in 0 blocks
==10570==    still reachable: 3,115,276 bytes in 69,145 blocks
--10572--   Scanning root segment: 0xae51000..0xae52fff (8192)
==10570==         suppressed: 0 bytes in 0 blocks
==10570== Rerun with --leak-check=full to see details of leaked memory
==10570== 
==10570== Use --track-origins=yes to see where uninitialised values come from
==10570== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10570== 
==10570== 1 errors in context 1 of 2:
==10570== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--10572--   Scanning root segment: 0xb054000..0xb054fff (4096)
==10570==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10570==    by 0x488CD0: stringsubst (subst.c:301)
==10570==    by 0x48801B: prefork (subst.c:77)
==10570==    by 0x42B318: execcmd (exec.c:2619)
--10572--   Scanning root segment: 0xb268000..0xb268fff (4096)
==10570==    by 0x428CA0: execpline2 (exec.c:1697)
==10570==    by 0x427FD2: execpline (exec.c:1484)
==10570==    by 0x427756: execlist (exec.c:1267)
==10570==    by 0x42717C: execode (exec.c:1073)
==10570==    by 0x431299: runshfunc (exec.c:5040)
==10570==    by 0x430E76: doshfunc (exec.c:4920)
==10570==    by 0x4302FB: execshfunc (exec.c:4557)
--10572--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==10570==    by 0x42D8C1: execcmd (exec.c:3373)
==10570== 
==10570== 
==10570== 2 errors in context 2 of 2:
==10570== Conditional jump or move depends on uninitialised value(s)
==10570==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
--10572--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
==10570==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10570==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10570==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10570==    by 0x42D8E9: execcmd (exec.c:3378)
==10570==    by 0x428CA0: execpline2 (exec.c:1697)
==10570==    by 0x427FD2: execpline (exec.c:1484)
--10572--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
==10570==    by 0x42779A: execlist (exec.c:1275)
==10570==    by 0x42717C: execode (exec.c:1073)
==10570==    by 0x431299: runshfunc (exec.c:5040)
==10570==    by 0x430E76: doshfunc (exec.c:4920)
==10570==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10570== 
==10570== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10572--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10572--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10569-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE8F5C,  len 4
==10569== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10569-by-pythonnut-on-???
==10569== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10569-by-pythonnut-on-???
==10569== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10569-by-pythonnut-on-???
==10569== 
==10569== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10569== don't want to do, unless you know exactly what you're doing,
==10569== or are doing some strange experiment):
==10569==   /usr/lib/valgrind/../../bin/vgdb --pid=10569 ...command...
==10569== 
==10569== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10569==   /path/to/gdb ./zsh
==10569== and then give GDB the following command
==10569==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10569
==10569== --pid is optional if only one valgrind process is running
==10569== 
--10569-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10569== 
==10569== HEAP SUMMARY:
==10569==     in use at exit: 3,124,173 bytes in 69,163 blocks
==10569==   total heap usage: 1,603,711 allocs, 1,534,548 frees, 129,728,328 bytes allocated
==10569== 
==10569== Searching for pointers to 69,163 not-freed blocks
--10569--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10569--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10569--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10569--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10569--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10569--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10569--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10569--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10569--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10569--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10569--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10569--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10569--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10569--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10569--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10569--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10569--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10569--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10569--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10569--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10569--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10569--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10569--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10569--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10569--   Scanning root segment: 0x701a000..0x701afff (4096)
--10569--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10569--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10569--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10569--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10569--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10569--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10569--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10569--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10569--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10569--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10572== Checked 4,790,880 bytes
==10572== 
==10572== LEAK SUMMARY:
==10572==    definitely lost: 2,205 bytes in 14 blocks
==10572==    indirectly lost: 6,756 bytes in 7 blocks
==10572==      possibly lost: 0 bytes in 0 blocks
==10572==    still reachable: 3,106,678 bytes in 68,998 blocks
==10572==         suppressed: 0 bytes in 0 blocks
==10572== Rerun with --leak-check=full to see details of leaked memory
==10572== 
==10572== Use --track-origins=yes to see where uninitialised values come from
==10572== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== 
==10572== 1 errors in context 1 of 2:
==10572== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10572==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10572==    by 0x488CD0: stringsubst (subst.c:301)
==10572==    by 0x48801B: prefork (subst.c:77)
==10572==    by 0x42B318: execcmd (exec.c:2619)
==10572==    by 0x428CA0: execpline2 (exec.c:1697)
==10572==    by 0x427FD2: execpline (exec.c:1484)
==10572==    by 0x427756: execlist (exec.c:1267)
==10572==    by 0x42717C: execode (exec.c:1073)
==10572==    by 0x431299: runshfunc (exec.c:5040)
==10572==    by 0x430E76: doshfunc (exec.c:4920)
==10572==    by 0x4302FB: execshfunc (exec.c:4557)
==10572==    by 0x42D8C1: execcmd (exec.c:3373)
==10572== 
==10572== 
==10572== 2 errors in context 2 of 2:
==10572== Conditional jump or move depends on uninitialised value(s)
==10572==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10572==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10572==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10572==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10572==    by 0x42D8E9: execcmd (exec.c:3378)
==10572==    by 0x428CA0: execpline2 (exec.c:1697)
==10572==    by 0x427FD2: execpline (exec.c:1484)
==10572==    by 0x42779A: execlist (exec.c:1275)
==10572==    by 0x42717C: execode (exec.c:1073)
==10572==    by 0x431299: runshfunc (exec.c:5040)
==10572==    by 0x430E76: doshfunc (exec.c:4920)
==10572==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10572== 
==10572== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10621-by-pythonnut-on-???
==10621== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10621-by-pythonnut-on-???
==10621== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10621-by-pythonnut-on-???
==10621== 
==10621== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10621== don't want to do, unless you know exactly what you're doing,
==10621== or are doing some strange experiment):
==10621==   /usr/lib/valgrind/../../bin/vgdb --pid=10621 ...command...
==10621== 
==10621== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10621==   /path/to/gdb ./zsh
==10621== and then give GDB the following command
==10621==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10621
==10621== --pid is optional if only one valgrind process is running
==10621== 
--10621-- Caught __NR_exit; running __libc_freeres()
--10573-- Caught __NR_exit; running __libc_freeres()
==10573== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10573-by-pythonnut-on-???
==10573== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10573-by-pythonnut-on-???
==10573== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10573-by-pythonnut-on-???
==10573== 
==10573== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10573== don't want to do, unless you know exactly what you're doing,
==10573== or are doing some strange experiment):
==10573==   /usr/lib/valgrind/../../bin/vgdb --pid=10573 ...command...
==10573== 
==10573== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10573==   /path/to/gdb ./zsh
==10573== and then give GDB the following command
==10573==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10573
==10573== --pid is optional if only one valgrind process is running
==10573== 
==10569== Checked 4,784,992 bytes
==10569== 
--10621-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10621== 
--10573-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10621== HEAP SUMMARY:
==10621==     in use at exit: 3,115,638 bytes in 69,019 blocks
==10621==   total heap usage: 1,603,396 allocs, 1,534,377 frees, 129,813,714 bytes allocated
==10621== 
==10573== 
==10573== HEAP SUMMARY:
==10573==     in use at exit: 3,135,707 bytes in 69,477 blocks
==10573==   total heap usage: 1,597,329 allocs, 1,527,852 frees, 129,038,420 bytes allocated
==10573== 
==10569== LEAK SUMMARY:
==10569==    definitely lost: 2,205 bytes in 14 blocks
==10569==    indirectly lost: 6,756 bytes in 7 blocks
==10569==      possibly lost: 0 bytes in 0 blocks
==10569==    still reachable: 3,115,212 bytes in 69,142 blocks
==10569==         suppressed: 0 bytes in 0 blocks
==10569== Rerun with --leak-check=full to see details of leaked memory
==10569== 
==10569== Use --track-origins=yes to see where uninitialised values come from
==10569== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10569== 
==10569== 1 errors in context 1 of 2:
==10569== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10569==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10569==    by 0x488CD0: stringsubst (subst.c:301)
==10569==    by 0x48801B: prefork (subst.c:77)
==10569==    by 0x42B318: execcmd (exec.c:2619)
==10569==    by 0x428CA0: execpline2 (exec.c:1697)
==10569==    by 0x427FD2: execpline (exec.c:1484)
==10569==    by 0x427756: execlist (exec.c:1267)
==10569==    by 0x42717C: execode (exec.c:1073)
==10569==    by 0x431299: runshfunc (exec.c:5040)
==10569==    by 0x430E76: doshfunc (exec.c:4920)
==10569==    by 0x4302FB: execshfunc (exec.c:4557)
==10569==    by 0x42D8C1: execcmd (exec.c:3373)
==10569== 
==10569== 
==10569== 2 errors in context 2 of 2:
==10569== Conditional jump or move depends on uninitialised value(s)
==10569==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10569==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10569==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10569==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10569==    by 0x42D8E9: execcmd (exec.c:3378)
==10569==    by 0x428CA0: execpline2 (exec.c:1697)
==10569==    by 0x427FD2: execpline (exec.c:1484)
==10569==    by 0x42779A: execlist (exec.c:1275)
==10569==    by 0x42717C: execode (exec.c:1073)
==10569==    by 0x431299: runshfunc (exec.c:5040)
==10569==    by 0x430E76: doshfunc (exec.c:4920)
==10569==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10569== 
==10569== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== Searching for pointers to 69,019 not-freed blocks
--10621--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10621--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10621--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10621--   Scanning root segment: 0x4037000..0x403afff (16384)
--10621--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10621--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10621--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10621--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10621--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10621--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10621--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10621--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10621--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10621--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10621--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10621--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10621--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10621--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10621--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10621--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10621--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10621--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10621--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10621--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10621--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10621--   Scanning root segment: 0x701a000..0x701afff (4096)
--10621--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10621--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10621--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10621--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10621--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10621--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10621--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10621--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10621--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10621--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10622-- Caught __NR_exit; running __libc_freeres()
==10573== Searching for pointers to 69,477 not-freed blocks
--10573--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10573--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10573--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10573--   Scanning root segment: 0x4037000..0x403efff (32768)
--10573--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10573--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10573--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10573--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10573--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10573--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10573--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10573--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10573--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10573--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10573--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10573--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10573--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10573--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10573--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10573--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10573--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10573--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10573--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10573--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10573--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10573--   Scanning root segment: 0x701a000..0x701afff (4096)
--10573--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10573--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10573--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10573--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10573--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10573--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10573--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10573--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10573--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10573--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10622== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10622-by-pythonnut-on-???
==10622== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10622-by-pythonnut-on-???
==10622== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10622-by-pythonnut-on-???
==10622== 
==10622== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10622== don't want to do, unless you know exactly what you're doing,
==10622== or are doing some strange experiment):
==10622==   /usr/lib/valgrind/../../bin/vgdb --pid=10622 ...command...
==10622== 
==10622== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10622==   /path/to/gdb ./zsh
==10622== and then give GDB the following command
==10622==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10622
==10622== --pid is optional if only one valgrind process is running
==10622== 
--10622-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10622== 
==10622== HEAP SUMMARY:
==10622==     in use at exit: 3,124,180 bytes in 69,163 blocks
==10622==   total heap usage: 1,603,726 allocs, 1,534,563 frees, 129,733,326 bytes allocated
==10622== 
==10622== Searching for pointers to 69,163 not-freed blocks
--10622--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10622--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10622--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10622--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10622--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10622--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10622--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10622--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10622--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10622--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10622--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10622--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10622--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10622--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10622--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10622--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10622--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10622--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10622--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10622--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10622--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10622--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10622--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10622--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10622--   Scanning root segment: 0x701a000..0x701afff (4096)
--10622--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10622--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10622--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10622--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10622--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10622--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10622--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10622--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10622--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10622--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10621== Checked 4,790,880 bytes
==10621== 
==10573== Checked 4,836,472 bytes
==10573== 
==10621== LEAK SUMMARY:
==10621==    definitely lost: 2,205 bytes in 14 blocks
==10621==    indirectly lost: 6,756 bytes in 7 blocks
==10621==      possibly lost: 0 bytes in 0 blocks
==10621==    still reachable: 3,106,677 bytes in 68,998 blocks
==10621==         suppressed: 0 bytes in 0 blocks
==10621== Rerun with --leak-check=full to see details of leaked memory
==10621== 
==10621== Use --track-origins=yes to see where uninitialised values come from
==10621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== 
==10621== 1 errors in context 1 of 2:
==10621== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10621==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10621==    by 0x488CD0: stringsubst (subst.c:301)
==10621==    by 0x48801B: prefork (subst.c:77)
==10621==    by 0x42B318: execcmd (exec.c:2619)
==10621==    by 0x428CA0: execpline2 (exec.c:1697)
==10621==    by 0x427FD2: execpline (exec.c:1484)
==10621==    by 0x427756: execlist (exec.c:1267)
==10621==    by 0x42717C: execode (exec.c:1073)
==10621==    by 0x431299: runshfunc (exec.c:5040)
==10621==    by 0x430E76: doshfunc (exec.c:4920)
==10621==    by 0x4302FB: execshfunc (exec.c:4557)
==10621==    by 0x42D8C1: execcmd (exec.c:3373)
==10621== 
==10621== 
==10621== 2 errors in context 2 of 2:
==10621== Conditional jump or move depends on uninitialised value(s)
==10621==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10621==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10621==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10621==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10621==    by 0x42D8E9: execcmd (exec.c:3378)
==10621==    by 0x428CA0: execpline2 (exec.c:1697)
==10621==    by 0x427FD2: execpline (exec.c:1484)
==10621==    by 0x42779A: execlist (exec.c:1275)
==10621==    by 0x42717C: execode (exec.c:1073)
==10621==    by 0x431299: runshfunc (exec.c:5040)
==10621==    by 0x430E76: doshfunc (exec.c:4920)
==10621==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10621== 
==10621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10573== LEAK SUMMARY:
==10573==    definitely lost: 2,221 bytes in 14 blocks
==10573==    indirectly lost: 6,796 bytes in 9 blocks
==10573==      possibly lost: 0 bytes in 0 blocks
==10573==    still reachable: 3,126,690 bytes in 69,454 blocks
==10573==         suppressed: 0 bytes in 0 blocks
==10573== Rerun with --leak-check=full to see details of leaked memory
==10573== 
==10573== Use --track-origins=yes to see where uninitialised values come from
==10573== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10573== 
==10573== 1 errors in context 1 of 2:
==10573== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10573==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10573==    by 0x488CD0: stringsubst (subst.c:301)
==10573==    by 0x48801B: prefork (subst.c:77)
==10573==    by 0x42B318: execcmd (exec.c:2619)
==10573==    by 0x428CA0: execpline2 (exec.c:1697)
==10573==    by 0x427FD2: execpline (exec.c:1484)
==10573==    by 0x427756: execlist (exec.c:1267)
==10573==    by 0x42717C: execode (exec.c:1073)
==10573==    by 0x431299: runshfunc (exec.c:5040)
==10573==    by 0x430E76: doshfunc (exec.c:4920)
==10573==    by 0x4302FB: execshfunc (exec.c:4557)
==10573==    by 0x42D8C1: execcmd (exec.c:3373)
==10573== 
==10573== 
==10573== 2 errors in context 2 of 2:
==10573== Conditional jump or move depends on uninitialised value(s)
==10573==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10573==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10573==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10573==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10573==    by 0x42D8E9: execcmd (exec.c:3378)
==10573==    by 0x428CA0: execpline2 (exec.c:1697)
==10573==    by 0x427FD2: execpline (exec.c:1484)
==10573==    by 0x42779A: execlist (exec.c:1275)
==10573==    by 0x42717C: execode (exec.c:1073)
==10573==    by 0x431299: runshfunc (exec.c:5040)
==10573==    by 0x430E76: doshfunc (exec.c:4920)
==10573==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10573== 
==10573== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10623-by-pythonnut-on-???
==10623== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10623-by-pythonnut-on-???
==10623== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10623-by-pythonnut-on-???
==10623== 
==10623== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10623== don't want to do, unless you know exactly what you're doing,
==10623== or are doing some strange experiment):
==10623==   /usr/lib/valgrind/../../bin/vgdb --pid=10623 ...command...
==10623== 
==10623== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10623==   /path/to/gdb ./zsh
==10623== and then give GDB the following command
==10623==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10623
==10623== --pid is optional if only one valgrind process is running
==10623== 
--10623-- Caught __NR_exit; running __libc_freeres()
--10566-- Caught __NR_exit; running __libc_freeres()
--10623-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10566-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10622== Checked 4,785,128 bytes
==10622== 
==10623== 
==10566== 
==10623== HEAP SUMMARY:
==10623==     in use at exit: 3,115,637 bytes in 69,019 blocks
==10623==   total heap usage: 1,603,404 allocs, 1,534,385 frees, 129,817,367 bytes allocated
==10623== 
==10566== HEAP SUMMARY:
==10566==     in use at exit: 3,133,543 bytes in 69,402 blocks
==10566==   total heap usage: 1,597,280 allocs, 1,527,878 frees, 129,039,031 bytes allocated
==10566== 
==10622== LEAK SUMMARY:
==10622==    definitely lost: 2,205 bytes in 14 blocks
==10622==    indirectly lost: 6,756 bytes in 7 blocks
==10622==      possibly lost: 0 bytes in 0 blocks
==10622==    still reachable: 3,115,219 bytes in 69,142 blocks
==10622==         suppressed: 0 bytes in 0 blocks
==10622== Rerun with --leak-check=full to see details of leaked memory
==10622== 
==10622== Use --track-origins=yes to see where uninitialised values come from
==10622== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10622== 
==10622== 1 errors in context 1 of 2:
==10622== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10622==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10622==    by 0x488CD0: stringsubst (subst.c:301)
==10622==    by 0x48801B: prefork (subst.c:77)
==10622==    by 0x42B318: execcmd (exec.c:2619)
==10622==    by 0x428CA0: execpline2 (exec.c:1697)
==10622==    by 0x427FD2: execpline (exec.c:1484)
==10622==    by 0x427756: execlist (exec.c:1267)
==10622==    by 0x42717C: execode (exec.c:1073)
==10622==    by 0x431299: runshfunc (exec.c:5040)
==10622==    by 0x430E76: doshfunc (exec.c:4920)
==10622==    by 0x4302FB: execshfunc (exec.c:4557)
==10622==    by 0x42D8C1: execcmd (exec.c:3373)
==10622== 
==10622== 
==10622== 2 errors in context 2 of 2:
==10622== Conditional jump or move depends on uninitialised value(s)
==10622==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10622==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10622==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10622==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10622==    by 0x42D8E9: execcmd (exec.c:3378)
==10622==    by 0x428CA0: execpline2 (exec.c:1697)
==10622==    by 0x427FD2: execpline (exec.c:1484)
==10622==    by 0x42779A: execlist (exec.c:1275)
==10622==    by 0x42717C: execode (exec.c:1073)
==10622==    by 0x431299: runshfunc (exec.c:5040)
==10622==    by 0x430E76: doshfunc (exec.c:4920)
==10622==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10622== 
==10622== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== Searching for pointers to 69,019 not-freed blocks
--10623--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10623--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10623--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10623--   Scanning root segment: 0x4037000..0x403afff (16384)
--10623--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10623--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10623--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10623--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10623--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10623--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10623--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10623--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10623--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10623--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10623--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10623--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10623--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10623--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10623--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10623--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10623--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10566== Searching for pointers to 69,402 not-freed blocks
--10566--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10623--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10623--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10566--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10623--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10623--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10623--   Scanning root segment: 0x701a000..0x701afff (4096)
--10566--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10623--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10623--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10566--   Scanning root segment: 0x4037000..0x403afff (16384)
--10623--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10566--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10623--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10566--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10623--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10566--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10623--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10566--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10566--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10623--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10566--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10623--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10566--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10566--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10566--   Scanning root segment: 0x54ac000..0x54acfff (4096)
==10624== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10624-by-pythonnut-on-???
--10566--   Scanning root segment: 0x54ad000..0x54adfff (4096)
==10624== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10624-by-pythonnut-on-???
--10623--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
==10624== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10624-by-pythonnut-on-???
==10624== 
==10624== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10624== don't want to do, unless you know exactly what you're doing,
==10624== or are doing some strange experiment):
==10624==   /usr/lib/valgrind/../../bin/vgdb --pid=10624 ...command...
==10624== 
--10566--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
==10624== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10624==   /path/to/gdb ./zsh
==10624== and then give GDB the following command
==10624==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10624
==10624== --pid is optional if only one valgrind process is running
==10624== 
--10566--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10623--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10566--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10566--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10566--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10566--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10566--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10566--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10566--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10566--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10566--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10566--   Scanning root segment: 0x701a000..0x701afff (4096)
--10566--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10566--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10566--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10566--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10566--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10566--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10566--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10566--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10566--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10566--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10624-- Caught __NR_exit; running __libc_freeres()
--10624-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10624== 
==10624== HEAP SUMMARY:
==10624==     in use at exit: 3,124,276 bytes in 69,163 blocks
==10624==   total heap usage: 1,603,742 allocs, 1,534,579 frees, 129,738,113 bytes allocated
==10624== 
==10624== Searching for pointers to 69,163 not-freed blocks
--10624--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10624--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10624--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10624--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10624--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10624--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10624--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10624--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10624--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10624--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10624--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10624--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10624--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10624--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10624--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10624--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10624--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10624--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10624--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10624--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10624--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10624--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10624--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10624--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10624--   Scanning root segment: 0x701a000..0x701afff (4096)
--10624--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10624--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10624--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10624--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10624--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10624--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10624--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10624--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10624--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10624--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10623== Checked 4,790,880 bytes
==10623== 
==10566== Checked 4,816,400 bytes
==10566== 
==10623== LEAK SUMMARY:
==10623==    definitely lost: 2,205 bytes in 14 blocks
==10623==    indirectly lost: 6,756 bytes in 7 blocks
==10623==      possibly lost: 0 bytes in 0 blocks
==10623==    still reachable: 3,106,676 bytes in 68,998 blocks
==10623==         suppressed: 0 bytes in 0 blocks
==10623== Rerun with --leak-check=full to see details of leaked memory
==10623== 
==10623== Use --track-origins=yes to see where uninitialised values come from
==10623== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== 
==10623== 1 errors in context 1 of 2:
==10623== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10623==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10623==    by 0x488CD0: stringsubst (subst.c:301)
==10623==    by 0x48801B: prefork (subst.c:77)
==10623==    by 0x42B318: execcmd (exec.c:2619)
==10623==    by 0x428CA0: execpline2 (exec.c:1697)
==10623==    by 0x427FD2: execpline (exec.c:1484)
==10623==    by 0x427756: execlist (exec.c:1267)
==10623==    by 0x42717C: execode (exec.c:1073)
==10623==    by 0x431299: runshfunc (exec.c:5040)
==10623==    by 0x430E76: doshfunc (exec.c:4920)
==10623==    by 0x4302FB: execshfunc (exec.c:4557)
==10623==    by 0x42D8C1: execcmd (exec.c:3373)
==10623== 
==10623== 
==10623== 2 errors in context 2 of 2:
==10623== Conditional jump or move depends on uninitialised value(s)
==10623==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10623==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10623==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10623==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10623==    by 0x42D8E9: execcmd (exec.c:3378)
==10623==    by 0x428CA0: execpline2 (exec.c:1697)
==10623==    by 0x427FD2: execpline (exec.c:1484)
==10623==    by 0x42779A: execlist (exec.c:1275)
==10623==    by 0x42717C: execode (exec.c:1073)
==10623==    by 0x431299: runshfunc (exec.c:5040)
==10623==    by 0x430E76: doshfunc (exec.c:4920)
==10623==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10623== 
==10623== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10566== LEAK SUMMARY:
==10566==    definitely lost: 2,221 bytes in 14 blocks
==10566==    indirectly lost: 6,796 bytes in 9 blocks
==10566==      possibly lost: 0 bytes in 0 blocks
==10566==    still reachable: 3,124,526 bytes in 69,379 blocks
==10566==         suppressed: 0 bytes in 0 blocks
==10566== Rerun with --leak-check=full to see details of leaked memory
==10566== 
==10566== Use --track-origins=yes to see where uninitialised values come from
==10566== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10566== 
==10566== 1 errors in context 1 of 2:
==10566== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10566==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10566==    by 0x488CD0: stringsubst (subst.c:301)
==10566==    by 0x48801B: prefork (subst.c:77)
==10566==    by 0x42B318: execcmd (exec.c:2619)
==10566==    by 0x428CA0: execpline2 (exec.c:1697)
==10566==    by 0x427FD2: execpline (exec.c:1484)
==10566==    by 0x427756: execlist (exec.c:1267)
==10566==    by 0x42717C: execode (exec.c:1073)
==10566==    by 0x431299: runshfunc (exec.c:5040)
==10566==    by 0x430E76: doshfunc (exec.c:4920)
==10566==    by 0x4302FB: execshfunc (exec.c:4557)
==10566==    by 0x42D8C1: execcmd (exec.c:3373)
==10566== 
==10566== 
==10566== 2 errors in context 2 of 2:
==10566== Conditional jump or move depends on uninitialised value(s)
==10566==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10566==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10566==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10566==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10566==    by 0x42D8E9: execcmd (exec.c:3378)
==10566==    by 0x428CA0: execpline2 (exec.c:1697)
==10566==    by 0x427FD2: execpline (exec.c:1484)
==10566==    by 0x42779A: execlist (exec.c:1275)
==10566==    by 0x42717C: execode (exec.c:1073)
==10566==    by 0x431299: runshfunc (exec.c:5040)
==10566==    by 0x430E76: doshfunc (exec.c:4920)
==10566==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10566== 
==10566== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10627-by-pythonnut-on-???
==10627== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10627-by-pythonnut-on-???
==10627== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10627-by-pythonnut-on-???
==10627== 
==10627== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10627== don't want to do, unless you know exactly what you're doing,
==10627== or are doing some strange experiment):
==10627==   /usr/lib/valgrind/../../bin/vgdb --pid=10627 ...command...
==10627== 
==10627== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10627==   /path/to/gdb ./zsh
==10627== and then give GDB the following command
==10627==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10627
==10627== --pid is optional if only one valgrind process is running
==10627== 
--10627-- Caught __NR_exit; running __libc_freeres()
--10412-- Caught __NR_exit; running __libc_freeres()
--10627-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== 
--10412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== HEAP SUMMARY:
==10627==     in use at exit: 3,115,640 bytes in 69,019 blocks
==10627==   total heap usage: 1,603,406 allocs, 1,534,387 frees, 129,817,944 bytes allocated
==10627== 
==10624== Checked 4,784,408 bytes
==10624== 
==10412== 
==10412== HEAP SUMMARY:
==10412==     in use at exit: 3,131,300 bytes in 69,329 blocks
==10412==   total heap usage: 1,597,264 allocs, 1,527,935 frees, 129,035,320 bytes allocated
==10412== 
==10624== LEAK SUMMARY:
==10624==    definitely lost: 2,205 bytes in 14 blocks
==10624==    indirectly lost: 6,756 bytes in 7 blocks
==10624==      possibly lost: 0 bytes in 0 blocks
==10624==    still reachable: 3,115,315 bytes in 69,142 blocks
==10624==         suppressed: 0 bytes in 0 blocks
==10624== Rerun with --leak-check=full to see details of leaked memory
==10624== 
==10624== Use --track-origins=yes to see where uninitialised values come from
==10624== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10624== 
==10624== 1 errors in context 1 of 2:
==10624== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10624==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10624==    by 0x488CD0: stringsubst (subst.c:301)
==10624==    by 0x48801B: prefork (subst.c:77)
==10624==    by 0x42B318: execcmd (exec.c:2619)
==10624==    by 0x428CA0: execpline2 (exec.c:1697)
==10624==    by 0x427FD2: execpline (exec.c:1484)
==10624==    by 0x427756: execlist (exec.c:1267)
==10624==    by 0x42717C: execode (exec.c:1073)
==10624==    by 0x431299: runshfunc (exec.c:5040)
==10624==    by 0x430E76: doshfunc (exec.c:4920)
==10624==    by 0x4302FB: execshfunc (exec.c:4557)
==10624==    by 0x42D8C1: execcmd (exec.c:3373)
==10624== 
==10624== 
==10624== 2 errors in context 2 of 2:
==10624== Conditional jump or move depends on uninitialised value(s)
==10624==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10624==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10624==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10624==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10624==    by 0x42D8E9: execcmd (exec.c:3378)
==10624==    by 0x428CA0: execpline2 (exec.c:1697)
==10624==    by 0x427FD2: execpline (exec.c:1484)
==10624==    by 0x42779A: execlist (exec.c:1275)
==10624==    by 0x42717C: execode (exec.c:1073)
==10624==    by 0x431299: runshfunc (exec.c:5040)
==10624==    by 0x430E76: doshfunc (exec.c:4920)
==10624==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10624== 
==10624== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== Searching for pointers to 69,019 not-freed blocks
--10627--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10627--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10627--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10627--   Scanning root segment: 0x4037000..0x403afff (16384)
--10627--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10627--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10627--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10627--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10627--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10627--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10627--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10627--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10627--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10627--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10627--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10627--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10627--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10627--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10627--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10627--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10627--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10627--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10627--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10627--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10627--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10627--   Scanning root segment: 0x701a000..0x701afff (4096)
--10627--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10627--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10627--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10627--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10627--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10627--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10627--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10627--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10627--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10627--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10412== Searching for pointers to 69,329 not-freed blocks
--10412--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10412--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10412--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10412--   Scanning root segment: 0x4037000..0x403afff (16384)
--10412--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10412--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10412--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10412--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10412--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10412--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10412--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10412--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10412--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10412--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10412--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10412--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10412--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10412--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10412--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10412--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10412--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10412--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10412--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10412--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10412--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10412--   Scanning root segment: 0x701a000..0x701afff (4096)
--10412--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10412--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10412--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10412--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10412--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10412--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10412--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10412--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10412--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10412--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10629== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10629-by-pythonnut-on-???
==10629== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10629-by-pythonnut-on-???
==10629== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10629-by-pythonnut-on-???
==10629== 
==10629== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10629== don't want to do, unless you know exactly what you're doing,
==10629== or are doing some strange experiment):
==10629==   /usr/lib/valgrind/../../bin/vgdb --pid=10629 ...command...
==10629== 
==10629== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10629==   /path/to/gdb ./zsh
==10629== and then give GDB the following command
==10629==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10629
==10629== --pid is optional if only one valgrind process is running
==10629== 
--10629-- Caught __NR_exit; running __libc_freeres()
==10627== Checked 4,790,880 bytes
==10627== 
==10412== Checked 4,813,760 bytes
==10412== 
--10629-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== LEAK SUMMARY:
==10627==    definitely lost: 2,205 bytes in 14 blocks
==10627==    indirectly lost: 6,756 bytes in 7 blocks
==10627==      possibly lost: 0 bytes in 0 blocks
==10627==    still reachable: 3,106,679 bytes in 68,998 blocks
==10627==         suppressed: 0 bytes in 0 blocks
==10627== Rerun with --leak-check=full to see details of leaked memory
==10627== 
==10627== Use --track-origins=yes to see where uninitialised values come from
==10627== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== 
==10627== 1 errors in context 1 of 2:
==10627== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10627==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10627==    by 0x488CD0: stringsubst (subst.c:301)
==10627==    by 0x48801B: prefork (subst.c:77)
==10627==    by 0x42B318: execcmd (exec.c:2619)
==10627==    by 0x428CA0: execpline2 (exec.c:1697)
==10627==    by 0x427FD2: execpline (exec.c:1484)
==10627==    by 0x427756: execlist (exec.c:1267)
==10627==    by 0x42717C: execode (exec.c:1073)
==10627==    by 0x431299: runshfunc (exec.c:5040)
==10627==    by 0x430E76: doshfunc (exec.c:4920)
==10627==    by 0x4302FB: execshfunc (exec.c:4557)
==10627==    by 0x42D8C1: execcmd (exec.c:3373)
==10627== 
==10627== 
==10627== 2 errors in context 2 of 2:
==10627== Conditional jump or move depends on uninitialised value(s)
==10627==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10627==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10627==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10627==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10627==    by 0x42D8E9: execcmd (exec.c:3378)
==10627==    by 0x428CA0: execpline2 (exec.c:1697)
==10627==    by 0x427FD2: execpline (exec.c:1484)
==10627==    by 0x42779A: execlist (exec.c:1275)
==10627==    by 0x42717C: execode (exec.c:1073)
==10627==    by 0x431299: runshfunc (exec.c:5040)
==10627==    by 0x430E76: doshfunc (exec.c:4920)
==10627==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10627== 
==10627== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10629== 
==10629== HEAP SUMMARY:
==10629==     in use at exit: 3,124,550 bytes in 69,169 blocks
==10629==   total heap usage: 1,604,267 allocs, 1,535,098 frees, 129,890,142 bytes allocated
==10629== 
==10412== LEAK SUMMARY:
==10412==    definitely lost: 2,221 bytes in 14 blocks
==10412==    indirectly lost: 6,796 bytes in 9 blocks
==10412==      possibly lost: 0 bytes in 0 blocks
==10412==    still reachable: 3,122,283 bytes in 69,306 blocks
==10412==         suppressed: 0 bytes in 0 blocks
==10412== Rerun with --leak-check=full to see details of leaked memory
==10412== 
==10412== Use --track-origins=yes to see where uninitialised values come from
==10412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10412== 
==10412== 1 errors in context 1 of 2:
==10412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10412==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10412==    by 0x488CD0: stringsubst (subst.c:301)
==10412==    by 0x48801B: prefork (subst.c:77)
==10412==    by 0x42B318: execcmd (exec.c:2619)
==10412==    by 0x428CA0: execpline2 (exec.c:1697)
==10412==    by 0x427FD2: execpline (exec.c:1484)
==10412==    by 0x427756: execlist (exec.c:1267)
==10412==    by 0x42717C: execode (exec.c:1073)
==10412==    by 0x431299: runshfunc (exec.c:5040)
==10412==    by 0x430E76: doshfunc (exec.c:4920)
==10412==    by 0x4302FB: execshfunc (exec.c:4557)
==10412==    by 0x42D8C1: execcmd (exec.c:3373)
==10412== 
==10412== 
==10412== 2 errors in context 2 of 2:
==10412== Conditional jump or move depends on uninitialised value(s)
==10412==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10412==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10412==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10412==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10412==    by 0x42D8E9: execcmd (exec.c:3378)
==10412==    by 0x428CA0: execpline2 (exec.c:1697)
==10412==    by 0x427FD2: execpline (exec.c:1484)
==10412==    by 0x42779A: execlist (exec.c:1275)
==10412==    by 0x42717C: execode (exec.c:1073)
==10412==    by 0x431299: runshfunc (exec.c:5040)
==10412==    by 0x430E76: doshfunc (exec.c:4920)
==10412==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10412== 
==10412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10630== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10630-by-pythonnut-on-???
==10630== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10630-by-pythonnut-on-???
==10630== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10630-by-pythonnut-on-???
==10630== 
==10630== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10630== don't want to do, unless you know exactly what you're doing,
==10630== or are doing some strange experiment):
==10630==   /usr/lib/valgrind/../../bin/vgdb --pid=10630 ...command...
==10630== 
==10630== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10630==   /path/to/gdb ./zsh
==10630== and then give GDB the following command
==10630==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10630
==10630== --pid is optional if only one valgrind process is running
==10630== 
==10629== Searching for pointers to 69,169 not-freed blocks
--10631-- Caught __NR_exit; running __libc_freeres()
--10629--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10629--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10629--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10629--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10629--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10629--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10629--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10629--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10629--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10629--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10629--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10629--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10629--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10629--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10629--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10629--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10629--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10629--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10629--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10629--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10629--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10629--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10629--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10629--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10629--   Scanning root segment: 0x701a000..0x701afff (4096)
--10629--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10629--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10629--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10629--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10629--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10629--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10629--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10629--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10629--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10629--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
==10631== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10631-by-pythonnut-on-???
==10631== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10631-by-pythonnut-on-???
==10631== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10631-by-pythonnut-on-???
==10631== 
==10631== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10631== don't want to do, unless you know exactly what you're doing,
==10631== or are doing some strange experiment):
==10631==   /usr/lib/valgrind/../../bin/vgdb --pid=10631 ...command...
==10631== 
==10631== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10631==   /path/to/gdb ./zsh
==10631== and then give GDB the following command
==10631==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10631
==10631== --pid is optional if only one valgrind process is running
==10631== 
--10631-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10631== 
==10631== HEAP SUMMARY:
==10631==     in use at exit: 3,115,922 bytes in 69,024 blocks
==10631==   total heap usage: 1,603,412 allocs, 1,534,388 frees, 129,821,558 bytes allocated
==10631== 
==10631== Searching for pointers to 69,024 not-freed blocks
--10631--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10631--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10631--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10631--   Scanning root segment: 0x4037000..0x403afff (16384)
--10631--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10631--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10631--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10631--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10631--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10631--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10631--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10631--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10631--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10631--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10631--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10631--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10631--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10631--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10631--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10631--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10631--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10631--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10631--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10631--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10631--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10631--   Scanning root segment: 0x701a000..0x701afff (4096)
--10631--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10631--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10631--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10631--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10631--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10631--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10631--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10631--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10631--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10631--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10629== Checked 4,784,616 bytes
==10629== 
==10629== LEAK SUMMARY:
==10629==    definitely lost: 2,205 bytes in 14 blocks
==10629==    indirectly lost: 6,756 bytes in 7 blocks
==10629==      possibly lost: 0 bytes in 0 blocks
==10629==    still reachable: 3,115,589 bytes in 69,148 blocks
==10629==         suppressed: 0 bytes in 0 blocks
==10629== Rerun with --leak-check=full to see details of leaked memory
==10629== 
==10629== Use --track-origins=yes to see where uninitialised values come from
==10629== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10629== 
==10629== 1 errors in context 1 of 2:
==10629== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10629==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10629==    by 0x488CD0: stringsubst (subst.c:301)
==10629==    by 0x48801B: prefork (subst.c:77)
==10629==    by 0x42B318: execcmd (exec.c:2619)
==10629==    by 0x428CA0: execpline2 (exec.c:1697)
==10629==    by 0x427FD2: execpline (exec.c:1484)
==10629==    by 0x427756: execlist (exec.c:1267)
==10629==    by 0x42717C: execode (exec.c:1073)
==10629==    by 0x431299: runshfunc (exec.c:5040)
==10629==    by 0x430E76: doshfunc (exec.c:4920)
==10629==    by 0x4302FB: execshfunc (exec.c:4557)
==10629==    by 0x42D8C1: execcmd (exec.c:3373)
==10629== 
==10629== 
==10629== 2 errors in context 2 of 2:
==10629== Conditional jump or move depends on uninitialised value(s)
==10629==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10629==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10629==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10629==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10629==    by 0x42D8E9: execcmd (exec.c:3378)
==10629==    by 0x428CA0: execpline2 (exec.c:1697)
==10629==    by 0x427FD2: execpline (exec.c:1484)
==10629==    by 0x42779A: execlist (exec.c:1275)
==10629==    by 0x42717C: execode (exec.c:1073)
==10629==    by 0x431299: runshfunc (exec.c:5040)
==10629==    by 0x430E76: doshfunc (exec.c:4920)
==10629==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10629== 
==10629== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10633-- Caught __NR_exit; running __libc_freeres()
==10633== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10633-by-pythonnut-on-???
==10633== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10633-by-pythonnut-on-???
==10633== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10633-by-pythonnut-on-???
==10633== 
==10633== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10633== don't want to do, unless you know exactly what you're doing,
==10633== or are doing some strange experiment):
==10633==   /usr/lib/valgrind/../../bin/vgdb --pid=10633 ...command...
==10633== 
==10633== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10633==   /path/to/gdb ./zsh
==10633== and then give GDB the following command
==10633==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10633
==10633== --pid is optional if only one valgrind process is running
==10633== 
==10631== Checked 4,791,792 bytes
==10631== 
--10633-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10633== 
==10633== HEAP SUMMARY:
==10633==     in use at exit: 3,124,454 bytes in 69,169 blocks
==10633==   total heap usage: 1,604,247 allocs, 1,535,078 frees, 129,887,912 bytes allocated
==10633== 
==10631== LEAK SUMMARY:
==10631==    definitely lost: 2,205 bytes in 14 blocks
==10631==    indirectly lost: 6,756 bytes in 7 blocks
==10631==      possibly lost: 0 bytes in 0 blocks
==10631==    still reachable: 3,106,961 bytes in 69,003 blocks
==10631==         suppressed: 0 bytes in 0 blocks
==10631== Rerun with --leak-check=full to see details of leaked memory
==10631== 
==10631== Use --track-origins=yes to see where uninitialised values come from
==10631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10631== 
==10631== 1 errors in context 1 of 2:
==10631== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10631==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10631==    by 0x488CD0: stringsubst (subst.c:301)
==10631==    by 0x48801B: prefork (subst.c:77)
==10631==    by 0x42B318: execcmd (exec.c:2619)
==10631==    by 0x428CA0: execpline2 (exec.c:1697)
==10631==    by 0x427FD2: execpline (exec.c:1484)
==10631==    by 0x427756: execlist (exec.c:1267)
==10631==    by 0x42717C: execode (exec.c:1073)
==10631==    by 0x431299: runshfunc (exec.c:5040)
==10631==    by 0x430E76: doshfunc (exec.c:4920)
==10631==    by 0x4302FB: execshfunc (exec.c:4557)
==10631==    by 0x42D8C1: execcmd (exec.c:3373)
==10631== 
==10631== 
==10631== 2 errors in context 2 of 2:
==10631== Conditional jump or move depends on uninitialised value(s)
==10631==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10631==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10631==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10631==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10631==    by 0x42D8E9: execcmd (exec.c:3378)
==10631==    by 0x428CA0: execpline2 (exec.c:1697)
==10631==    by 0x427FD2: execpline (exec.c:1484)
==10631==    by 0x42779A: execlist (exec.c:1275)
==10631==    by 0x42717C: execode (exec.c:1073)
==10631==    by 0x431299: runshfunc (exec.c:5040)
==10631==    by 0x430E76: doshfunc (exec.c:4920)
==10631==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10631== 
==10631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10630-- Caught __NR_exit; running __libc_freeres()
==10633== Searching for pointers to 69,169 not-freed blocks
--10633--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10633--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10633--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10633--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10633--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10633--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10633--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10633--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10633--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10633--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10633--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10633--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10633--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10633--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10633--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10633--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10633--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10633--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10633--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10633--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10633--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10633--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10633--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10633--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10633--   Scanning root segment: 0x701a000..0x701afff (4096)
--10633--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10633--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10633--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10633--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10633--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10633--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10633--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10633--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10633--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10633--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10630-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10630== 
==10630== HEAP SUMMARY:
==10630==     in use at exit: 3,115,698 bytes in 69,021 blocks
==10630==   total heap usage: 1,603,415 allocs, 1,534,394 frees, 129,822,134 bytes allocated
==10630== 
==10630== Searching for pointers to 69,021 not-freed blocks
--10630--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10630--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10630--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10630--   Scanning root segment: 0x4037000..0x403afff (16384)
--10630--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10630--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10630--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10630--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10630--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10630--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10630--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10630--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10630--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10630--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10630--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10630--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10630--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10630--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10630--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10630--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10630--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10630--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10630--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10630--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10630--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10630--   Scanning root segment: 0x701a000..0x701afff (4096)
--10630--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10630--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10630--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10630--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10630--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10630--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10630--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10630--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10630--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10630--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10633== Checked 4,784,520 bytes
==10633== 
==10633== LEAK SUMMARY:
==10633==    definitely lost: 2,205 bytes in 14 blocks
==10633==    indirectly lost: 6,756 bytes in 7 blocks
==10633==      possibly lost: 0 bytes in 0 blocks
==10633==    still reachable: 3,115,493 bytes in 69,148 blocks
==10633==         suppressed: 0 bytes in 0 blocks
==10633== Rerun with --leak-check=full to see details of leaked memory
==10633== 
==10633== Use --track-origins=yes to see where uninitialised values come from
==10633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10633== 
==10633== 1 errors in context 1 of 2:
==10633== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10633==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10633==    by 0x488CD0: stringsubst (subst.c:301)
==10633==    by 0x48801B: prefork (subst.c:77)
==10633==    by 0x42B318: execcmd (exec.c:2619)
==10633==    by 0x428CA0: execpline2 (exec.c:1697)
==10633==    by 0x427FD2: execpline (exec.c:1484)
==10633==    by 0x427756: execlist (exec.c:1267)
==10633==    by 0x42717C: execode (exec.c:1073)
==10633==    by 0x431299: runshfunc (exec.c:5040)
==10633==    by 0x430E76: doshfunc (exec.c:4920)
==10633==    by 0x4302FB: execshfunc (exec.c:4557)
==10633==    by 0x42D8C1: execcmd (exec.c:3373)
==10633== 
==10633== 
==10633== 2 errors in context 2 of 2:
==10633== Conditional jump or move depends on uninitialised value(s)
==10633==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10633==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10633==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10633==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10633==    by 0x42D8E9: execcmd (exec.c:3378)
==10633==    by 0x428CA0: execpline2 (exec.c:1697)
==10633==    by 0x427FD2: execpline (exec.c:1484)
==10633==    by 0x42779A: execlist (exec.c:1275)
==10633==    by 0x42717C: execode (exec.c:1073)
==10633==    by 0x431299: runshfunc (exec.c:5040)
==10633==    by 0x430E76: doshfunc (exec.c:4920)
==10633==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10633== 
==10633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10634== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10634-by-pythonnut-on-???
==10634== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10634-by-pythonnut-on-???
==10634== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10634-by-pythonnut-on-???
==10634== 
==10634== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10634== don't want to do, unless you know exactly what you're doing,
==10634== or are doing some strange experiment):
==10634==   /usr/lib/valgrind/../../bin/vgdb --pid=10634 ...command...
==10634== 
==10634== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10634==   /path/to/gdb ./zsh
==10634== and then give GDB the following command
==10634==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10634
==10634== --pid is optional if only one valgrind process is running
==10634== 
==10630== Checked 4,790,936 bytes
==10630== 
--10634-- Caught __NR_exit; running __libc_freeres()
==10630== LEAK SUMMARY:
==10630==    definitely lost: 2,205 bytes in 14 blocks
==10630==    indirectly lost: 6,756 bytes in 7 blocks
==10630==      possibly lost: 0 bytes in 0 blocks
==10630==    still reachable: 3,106,737 bytes in 69,000 blocks
==10630==         suppressed: 0 bytes in 0 blocks
==10630== Rerun with --leak-check=full to see details of leaked memory
==10630== 
==10630== Use --track-origins=yes to see where uninitialised values come from
==10630== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10630== 
==10630== 1 errors in context 1 of 2:
==10630== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10630==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10630==    by 0x488CD0: stringsubst (subst.c:301)
==10630==    by 0x48801B: prefork (subst.c:77)
==10630==    by 0x42B318: execcmd (exec.c:2619)
==10630==    by 0x428CA0: execpline2 (exec.c:1697)
==10630==    by 0x427FD2: execpline (exec.c:1484)
==10630==    by 0x427756: execlist (exec.c:1267)
==10630==    by 0x42717C: execode (exec.c:1073)
==10630==    by 0x431299: runshfunc (exec.c:5040)
==10630==    by 0x430E76: doshfunc (exec.c:4920)
==10630==    by 0x4302FB: execshfunc (exec.c:4557)
==10630==    by 0x42D8C1: execcmd (exec.c:3373)
==10630== 
==10630== 
==10630== 2 errors in context 2 of 2:
==10630== Conditional jump or move depends on uninitialised value(s)
==10630==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10630==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10630==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10630==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10630==    by 0x42D8E9: execcmd (exec.c:3378)
==10630==    by 0x428CA0: execpline2 (exec.c:1697)
==10630==    by 0x427FD2: execpline (exec.c:1484)
==10630==    by 0x42779A: execlist (exec.c:1275)
==10630==    by 0x42717C: execode (exec.c:1073)
==10630==    by 0x431299: runshfunc (exec.c:5040)
==10630==    by 0x430E76: doshfunc (exec.c:4920)
==10630==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10630== 
==10630== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10489-- Caught __NR_exit; running __libc_freeres()
--10634-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10634== 
==10634== HEAP SUMMARY:
==10634==     in use at exit: 3,124,482 bytes in 69,170 blocks
==10634==   total heap usage: 1,604,260 allocs, 1,535,090 frees, 129,890,599 bytes allocated
==10634== 
--10489-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10489== 
==10489== HEAP SUMMARY:
==10489==     in use at exit: 3,113,204 bytes in 68,944 blocks
==10489==   total heap usage: 1,603,414 allocs, 1,534,470 frees, 129,823,924 bytes allocated
==10489== 
==10634== Searching for pointers to 69,170 not-freed blocks
--10634--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10634--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10634--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10634--   Scanning root segment: 0x4037000..0x403afff (16384)
--10634--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10634--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10634--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10634--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10634--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10634--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10634--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10634--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10634--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10634--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10634--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10634--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10634--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10634--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10634--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10634--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10634--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10634--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10634--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10634--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10634--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10634--   Scanning root segment: 0x701a000..0x701afff (4096)
--10634--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10634--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10634--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10634--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10634--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10634--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10634--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10634--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10634--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10634--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10489== Searching for pointers to 68,944 not-freed blocks
--10489--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10489--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10489--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10489--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10489--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10489--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10489--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10489--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10489--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10489--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10489--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10489--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10489--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10489--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10489--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10489--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10489--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10489--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10489--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10489--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10489--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10489--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10489--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10489--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10489--   Scanning root segment: 0x701a000..0x701afff (4096)
--10489--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10489--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10489--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10489--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10489--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10489--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10489--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10489--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10489--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10489--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10634== Checked 4,800,416 bytes
==10634== 
==10634== LEAK SUMMARY:
==10634==    definitely lost: 2,205 bytes in 14 blocks
==10634==    indirectly lost: 6,756 bytes in 7 blocks
==10634==      possibly lost: 0 bytes in 0 blocks
==10634==    still reachable: 3,115,521 bytes in 69,149 blocks
==10634==         suppressed: 0 bytes in 0 blocks
==10634== Rerun with --leak-check=full to see details of leaked memory
==10634== 
==10634== Use --track-origins=yes to see where uninitialised values come from
==10634== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10634== 
==10634== 1 errors in context 1 of 2:
==10634== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10634==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10634==    by 0x488CD0: stringsubst (subst.c:301)
==10634==    by 0x48801B: prefork (subst.c:77)
==10634==    by 0x42B318: execcmd (exec.c:2619)
==10634==    by 0x428CA0: execpline2 (exec.c:1697)
==10634==    by 0x427FD2: execpline (exec.c:1484)
==10634==    by 0x427756: execlist (exec.c:1267)
==10634==    by 0x42717C: execode (exec.c:1073)
==10634==    by 0x431299: runshfunc (exec.c:5040)
==10634==    by 0x430E76: doshfunc (exec.c:4920)
==10634==    by 0x4302FB: execshfunc (exec.c:4557)
==10634==    by 0x42D8C1: execcmd (exec.c:3373)
==10634== 
==10634== 
==10634== 2 errors in context 2 of 2:
==10634== Conditional jump or move depends on uninitialised value(s)
==10634==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10634==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10634==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10634==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10634==    by 0x42D8E9: execcmd (exec.c:3378)
==10634==    by 0x428CA0: execpline2 (exec.c:1697)
==10634==    by 0x427FD2: execpline (exec.c:1484)
==10634==    by 0x42779A: execlist (exec.c:1275)
==10634==    by 0x42717C: execode (exec.c:1073)
==10634==    by 0x431299: runshfunc (exec.c:5040)
==10634==    by 0x430E76: doshfunc (exec.c:4920)
==10634==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10634== 
==10634== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10489== Checked 4,769,080 bytes
==10489== 
==10489== LEAK SUMMARY:
==10489==    definitely lost: 2,205 bytes in 14 blocks
==10489==    indirectly lost: 6,756 bytes in 7 blocks
==10489==      possibly lost: 0 bytes in 0 blocks
==10489==    still reachable: 3,104,243 bytes in 68,923 blocks
==10489==         suppressed: 0 bytes in 0 blocks
==10489== Rerun with --leak-check=full to see details of leaked memory
==10489== 
==10489== Use --track-origins=yes to see where uninitialised values come from
==10489== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10489== 
==10489== 1 errors in context 1 of 2:
==10489== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10489==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10489==    by 0x488CD0: stringsubst (subst.c:301)
==10489==    by 0x48801B: prefork (subst.c:77)
==10489==    by 0x42B318: execcmd (exec.c:2619)
==10489==    by 0x428CA0: execpline2 (exec.c:1697)
==10489==    by 0x427FD2: execpline (exec.c:1484)
==10489==    by 0x427756: execlist (exec.c:1267)
==10489==    by 0x42717C: execode (exec.c:1073)
==10489==    by 0x431299: runshfunc (exec.c:5040)
==10489==    by 0x430E76: doshfunc (exec.c:4920)
==10489==    by 0x4302FB: execshfunc (exec.c:4557)
==10489==    by 0x42D8C1: execcmd (exec.c:3373)
==10489== 
==10489== 
==10489== 2 errors in context 2 of 2:
==10489== Conditional jump or move depends on uninitialised value(s)
==10489==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10489==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10489==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10489==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10489==    by 0x42D8E9: execcmd (exec.c:3378)
==10489==    by 0x428CA0: execpline2 (exec.c:1697)
==10489==    by 0x427FD2: execpline (exec.c:1484)
==10489==    by 0x42779A: execlist (exec.c:1275)
==10489==    by 0x42717C: execode (exec.c:1073)
==10489==    by 0x431299: runshfunc (exec.c:5040)
==10489==    by 0x430E76: doshfunc (exec.c:4920)
==10489==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10489== 
==10489== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10635== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10635-by-pythonnut-on-???
==10635== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10635-by-pythonnut-on-???
==10635== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10635-by-pythonnut-on-???
==10635== 
==10635== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10635== don't want to do, unless you know exactly what you're doing,
==10635== or are doing some strange experiment):
==10635==   /usr/lib/valgrind/../../bin/vgdb --pid=10635 ...command...
==10635== 
==10635== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10635==   /path/to/gdb ./zsh
==10635== and then give GDB the following command
==10635==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10635
==10635== --pid is optional if only one valgrind process is running
==10635== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
--10636-- Caught __NR_exit; running __libc_freeres()
==10636== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10636-by-pythonnut-on-???
==10636== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10636-by-pythonnut-on-???
==10636== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10636-by-pythonnut-on-???
==10636== 
==10636== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10636== don't want to do, unless you know exactly what you're doing,
==10636== or are doing some strange experiment):
==10636==   /usr/lib/valgrind/../../bin/vgdb --pid=10636 ...command...
==10636== 
==10636== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10636==   /path/to/gdb ./zsh
==10636== and then give GDB the following command
==10636==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10636
==10636== --pid is optional if only one valgrind process is running
==10636== 
--10636-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10636== 
==10636== HEAP SUMMARY:
==10636==     in use at exit: 3,113,740 bytes in 68,956 blocks
==10636==   total heap usage: 1,603,241 allocs, 1,534,285 frees, 129,778,731 bytes allocated
==10636== 
==10636== Searching for pointers to 68,956 not-freed blocks
--10636--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10636--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10636--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10636--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10636--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10636--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10636--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10636--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10636--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10636--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10636--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10636--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10636--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10636--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10636--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10636--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10636--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10636--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10636--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10636--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10636--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10636--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10636--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10636--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10636--   Scanning root segment: 0x701a000..0x701afff (4096)
--10636--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10636--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10636--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10636--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10636--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10636--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10636--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10636--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10636--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10636--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10636== Checked 4,771,656 bytes
==10636== 
==10636== LEAK SUMMARY:
==10636==    definitely lost: 2,205 bytes in 14 blocks
==10636==    indirectly lost: 6,756 bytes in 7 blocks
==10636==      possibly lost: 0 bytes in 0 blocks
==10636==    still reachable: 3,104,779 bytes in 68,935 blocks
==10636==         suppressed: 0 bytes in 0 blocks
==10636== Rerun with --leak-check=full to see details of leaked memory
==10636== 
==10636== Use --track-origins=yes to see where uninitialised values come from
==10636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10636== 
==10636== 1 errors in context 1 of 2:
==10636== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10636==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10636==    by 0x488CD0: stringsubst (subst.c:301)
==10636==    by 0x48801B: prefork (subst.c:77)
==10636==    by 0x42B318: execcmd (exec.c:2619)
==10636==    by 0x428CA0: execpline2 (exec.c:1697)
==10636==    by 0x427FD2: execpline (exec.c:1484)
==10636==    by 0x427756: execlist (exec.c:1267)
==10636==    by 0x42717C: execode (exec.c:1073)
==10636==    by 0x431299: runshfunc (exec.c:5040)
==10636==    by 0x430E76: doshfunc (exec.c:4920)
==10636==    by 0x4302FB: execshfunc (exec.c:4557)
==10636==    by 0x42D8C1: execcmd (exec.c:3373)
==10636== 
==10636== 
==10636== 2 errors in context 2 of 2:
==10636== Conditional jump or move depends on uninitialised value(s)
==10636==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10636==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10636==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10636==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10636==    by 0x42D8E9: execcmd (exec.c:3378)
==10636==    by 0x428CA0: execpline2 (exec.c:1697)
==10636==    by 0x427FD2: execpline (exec.c:1484)
==10636==    by 0x42779A: execlist (exec.c:1275)
==10636==    by 0x42717C: execode (exec.c:1073)
==10636==    by 0x431299: runshfunc (exec.c:5040)
==10636==    by 0x430E76: doshfunc (exec.c:4920)
==10636==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10636== 
==10636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2AEC,  len 4
--10638-- Caught __NR_exit; running __libc_freeres()
==10638== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10638-by-pythonnut-on-???
==10638== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10638-by-pythonnut-on-???
==10638== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10638-by-pythonnut-on-???
==10638== 
==10638== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10638== don't want to do, unless you know exactly what you're doing,
==10638== or are doing some strange experiment):
==10638==   /usr/lib/valgrind/../../bin/vgdb --pid=10638 ...command...
==10638== 
==10638== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10638==   /path/to/gdb ./zsh
==10638== and then give GDB the following command
==10638==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10638
==10638== --pid is optional if only one valgrind process is running
==10638== 
--10638-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10638== 
==10638== HEAP SUMMARY:
==10638==     in use at exit: 3,114,131 bytes in 68,964 blocks
==10638==   total heap usage: 1,603,257 allocs, 1,534,293 frees, 129,782,842 bytes allocated
==10638== 
==10638== Searching for pointers to 68,964 not-freed blocks
--10638--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10638--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10638--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10638--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10638--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10638--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10638--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10638--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10638--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10638--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10638--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10638--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10638--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10638--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10638--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10638--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10638--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10638--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10638--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10638--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10638--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10638--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10638--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10638--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10638--   Scanning root segment: 0x701a000..0x701afff (4096)
--10638--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10638--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10638--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10638--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10638--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10638--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10638--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10638--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10638--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10638--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10638== Checked 4,771,760 bytes
==10638== 
==10638== LEAK SUMMARY:
==10638==    definitely lost: 2,205 bytes in 14 blocks
==10638==    indirectly lost: 6,756 bytes in 7 blocks
==10638==      possibly lost: 0 bytes in 0 blocks
==10638==    still reachable: 3,105,170 bytes in 68,943 blocks
==10638==         suppressed: 0 bytes in 0 blocks
==10638== Rerun with --leak-check=full to see details of leaked memory
==10638== 
==10638== Use --track-origins=yes to see where uninitialised values come from
==10638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10638== 
==10638== 1 errors in context 1 of 2:
==10638== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10638==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10638==    by 0x488CD0: stringsubst (subst.c:301)
==10638==    by 0x48801B: prefork (subst.c:77)
==10638==    by 0x42B318: execcmd (exec.c:2619)
==10638==    by 0x428CA0: execpline2 (exec.c:1697)
==10638==    by 0x427FD2: execpline (exec.c:1484)
==10638==    by 0x427756: execlist (exec.c:1267)
==10638==    by 0x42717C: execode (exec.c:1073)
==10638==    by 0x431299: runshfunc (exec.c:5040)
==10638==    by 0x430E76: doshfunc (exec.c:4920)
==10638==    by 0x4302FB: execshfunc (exec.c:4557)
==10638==    by 0x42D8C1: execcmd (exec.c:3373)
==10638== 
==10638== 
==10638== 2 errors in context 2 of 2:
==10638== Conditional jump or move depends on uninitialised value(s)
==10638==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10638==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10638==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10638==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10638==    by 0x42D8E9: execcmd (exec.c:3378)
==10638==    by 0x428CA0: execpline2 (exec.c:1697)
==10638==    by 0x427FD2: execpline (exec.c:1484)
==10638==    by 0x42779A: execlist (exec.c:1275)
==10638==    by 0x42717C: execode (exec.c:1073)
==10638==    by 0x431299: runshfunc (exec.c:5040)
==10638==    by 0x430E76: doshfunc (exec.c:4920)
==10638==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10638== 
==10638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10635-- Caught __NR_exit; running __libc_freeres()
--10635-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10635== 
==10635== HEAP SUMMARY:
==10635==     in use at exit: 3,113,269 bytes in 68,945 blocks
==10635==   total heap usage: 1,603,266 allocs, 1,534,321 frees, 129,784,845 bytes allocated
==10635== 
==10635== Searching for pointers to 68,945 not-freed blocks
--10635--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10635--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10635--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10635--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10635--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10635--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10635--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10635--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10635--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10635--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10635--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10635--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10635--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10635--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10635--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10635--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10635--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10635--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10635--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10635--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10635--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10635--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10635--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10635--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10635--   Scanning root segment: 0x701a000..0x701afff (4096)
--10635--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10635--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10635--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10635--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10635--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10635--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10635--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10635--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10635--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10635--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10635== Checked 4,769,144 bytes
==10635== 
==10635== LEAK SUMMARY:
==10635==    definitely lost: 2,205 bytes in 14 blocks
==10635==    indirectly lost: 6,756 bytes in 7 blocks
==10635==      possibly lost: 0 bytes in 0 blocks
==10635==    still reachable: 3,104,308 bytes in 68,924 blocks
==10635==         suppressed: 0 bytes in 0 blocks
==10635== Rerun with --leak-check=full to see details of leaked memory
==10635== 
==10635== Use --track-origins=yes to see where uninitialised values come from
==10635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10635== 
==10635== 1 errors in context 1 of 2:
==10635== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10635==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10635==    by 0x488CD0: stringsubst (subst.c:301)
==10635==    by 0x48801B: prefork (subst.c:77)
==10635==    by 0x42B318: execcmd (exec.c:2619)
==10635==    by 0x428CA0: execpline2 (exec.c:1697)
==10635==    by 0x427FD2: execpline (exec.c:1484)
==10635==    by 0x427756: execlist (exec.c:1267)
==10635==    by 0x42717C: execode (exec.c:1073)
==10635==    by 0x431299: runshfunc (exec.c:5040)
==10635==    by 0x430E76: doshfunc (exec.c:4920)
==10635==    by 0x4302FB: execshfunc (exec.c:4557)
==10635==    by 0x42D8C1: execcmd (exec.c:3373)
==10635== 
==10635== 
==10635== 2 errors in context 2 of 2:
==10635== Conditional jump or move depends on uninitialised value(s)
==10635==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10635==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10635==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10635==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10635==    by 0x42D8E9: execcmd (exec.c:3378)
==10635==    by 0x428CA0: execpline2 (exec.c:1697)
==10635==    by 0x427FD2: execpline (exec.c:1484)
==10635==    by 0x42779A: execlist (exec.c:1275)
==10635==    by 0x42717C: execode (exec.c:1073)
==10635==    by 0x431299: runshfunc (exec.c:5040)
==10635==    by 0x430E76: doshfunc (exec.c:4920)
==10635==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10635== 
==10635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10487-- Caught __NR_exit; running __libc_freeres()
--10487-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10487== 
==10487== HEAP SUMMARY:
==10487==     in use at exit: 3,112,472 bytes in 68,932 blocks
==10487==   total heap usage: 1,603,300 allocs, 1,534,368 frees, 129,782,220 bytes allocated
==10487== 
client request: code 4d430005,  addr 0xFFEFE4DAC,  len 4
==10487== Searching for pointers to 68,932 not-freed blocks
--10487--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10487--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10487--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10487--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10487--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10487--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10487--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10487--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10487--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10487--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10487--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10487--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10487--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10487--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10487--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10487--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10487--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10487--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10487--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10487--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10487--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10487--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10487--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10487--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10487--   Scanning root segment: 0x701a000..0x701afff (4096)
--10487--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10487--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10487--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10487--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10487--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10487--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10487--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10487--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10487--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10487--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10487== Checked 4,767,704 bytes
==10487== 
==10487== LEAK SUMMARY:
==10487==    definitely lost: 2,205 bytes in 14 blocks
==10487==    indirectly lost: 6,756 bytes in 7 blocks
==10487==      possibly lost: 0 bytes in 0 blocks
==10487==    still reachable: 3,103,511 bytes in 68,911 blocks
==10487==         suppressed: 0 bytes in 0 blocks
==10487== Rerun with --leak-check=full to see details of leaked memory
==10487== 
==10487== Use --track-origins=yes to see where uninitialised values come from
==10487== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10487== 
==10487== 1 errors in context 1 of 2:
==10487== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10487==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10487==    by 0x488CD0: stringsubst (subst.c:301)
==10487==    by 0x48801B: prefork (subst.c:77)
==10487==    by 0x42B318: execcmd (exec.c:2619)
==10487==    by 0x428CA0: execpline2 (exec.c:1697)
==10487==    by 0x427FD2: execpline (exec.c:1484)
==10487==    by 0x427756: execlist (exec.c:1267)
==10487==    by 0x42717C: execode (exec.c:1073)
==10487==    by 0x431299: runshfunc (exec.c:5040)
==10487==    by 0x430E76: doshfunc (exec.c:4920)
==10487==    by 0x4302FB: execshfunc (exec.c:4557)
==10487==    by 0x42D8C1: execcmd (exec.c:3373)
==10487== 
==10487== 
==10487== 2 errors in context 2 of 2:
==10487== Conditional jump or move depends on uninitialised value(s)
==10487==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10487==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10487==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10487==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10487==    by 0x42D8E9: execcmd (exec.c:3378)
==10487==    by 0x428CA0: execpline2 (exec.c:1697)
==10487==    by 0x427FD2: execpline (exec.c:1484)
==10487==    by 0x42779A: execlist (exec.c:1275)
==10487==    by 0x42717C: execode (exec.c:1073)
==10487==    by 0x431299: runshfunc (exec.c:5040)
==10487==    by 0x430E76: doshfunc (exec.c:4920)
==10487==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10487== 
==10487== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10695== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10695-by-pythonnut-on-???
==10695== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10695-by-pythonnut-on-???
==10695== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10695-by-pythonnut-on-???
==10695== 
==10695== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10695== don't want to do, unless you know exactly what you're doing,
==10695== or are doing some strange experiment):
==10695==   /usr/lib/valgrind/../../bin/vgdb --pid=10695 ...command...
==10695== 
==10695== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10695==   /path/to/gdb ./zsh
==10695== and then give GDB the following command
==10695==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10695
==10695== --pid is optional if only one valgrind process is running
==10695== 
--10695-- Caught __NR_exit; running __libc_freeres()
--10695-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10695== 
==10695== HEAP SUMMARY:
==10695==     in use at exit: 3,167,657 bytes in 69,836 blocks
==10695==   total heap usage: 1,700,417 allocs, 1,630,581 frees, 136,800,567 bytes allocated
==10695== 
==10695== Searching for pointers to 69,836 not-freed blocks
--10695--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10695--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10695--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10695--   Scanning root segment: 0x4037000..0x403afff (16384)
--10695--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10695--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10695--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10695--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10695--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10695--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10695--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10695--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10695--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10695--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10695--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10695--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10695--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10695--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10695--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10695--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10695--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10695--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10695--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10695--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10695--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10695--   Scanning root segment: 0x701a000..0x701afff (4096)
--10695--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10695--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10695--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10695--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10695--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10695--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10695--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10695--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10695--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10695--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10695== Checked 4,855,312 bytes
==10695== 
==10695== LEAK SUMMARY:
==10695==    definitely lost: 2,205 bytes in 14 blocks
==10695==    indirectly lost: 6,756 bytes in 7 blocks
==10695==      possibly lost: 0 bytes in 0 blocks
==10695==    still reachable: 3,158,696 bytes in 69,815 blocks
==10695==         suppressed: 0 bytes in 0 blocks
==10695== Rerun with --leak-check=full to see details of leaked memory
==10695== 
==10695== Use --track-origins=yes to see where uninitialised values come from
==10695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10695== 
==10695== 1 errors in context 1 of 2:
==10695== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10695==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10695==    by 0x488CD0: stringsubst (subst.c:301)
==10695==    by 0x48801B: prefork (subst.c:77)
==10695==    by 0x42B318: execcmd (exec.c:2619)
==10695==    by 0x428CA0: execpline2 (exec.c:1697)
==10695==    by 0x427FD2: execpline (exec.c:1484)
==10695==    by 0x427756: execlist (exec.c:1267)
==10695==    by 0x42717C: execode (exec.c:1073)
==10695==    by 0x431299: runshfunc (exec.c:5040)
==10695==    by 0x430E76: doshfunc (exec.c:4920)
==10695==    by 0x4302FB: execshfunc (exec.c:4557)
==10695==    by 0x42D8C1: execcmd (exec.c:3373)
==10695== 
==10695== 
==10695== 2 errors in context 2 of 2:
==10695== Conditional jump or move depends on uninitialised value(s)
==10695==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10695==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10695==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10695==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10695==    by 0x42D8E9: execcmd (exec.c:3378)
==10695==    by 0x428CA0: execpline2 (exec.c:1697)
==10695==    by 0x427FD2: execpline (exec.c:1484)
==10695==    by 0x42779A: execlist (exec.c:1275)
==10695==    by 0x42717C: execode (exec.c:1073)
==10695==    by 0x431299: runshfunc (exec.c:5040)
==10695==    by 0x430E76: doshfunc (exec.c:4920)
==10695==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10695== 
==10695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10906== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10906-by-pythonnut-on-???
==10906== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10906-by-pythonnut-on-???
==10906== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10906-by-pythonnut-on-???
==10906== 
==10906== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10906== don't want to do, unless you know exactly what you're doing,
==10906== or are doing some strange experiment):
==10906==   /usr/lib/valgrind/../../bin/vgdb --pid=10906 ...command...
==10906== 
==10906== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10906==   /path/to/gdb ./zsh
==10906== and then give GDB the following command
==10906==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10906
==10906== --pid is optional if only one valgrind process is running
==10906== 
--10906-- Caught __NR_exit; running __libc_freeres()
--10906-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10906== 
==10906== HEAP SUMMARY:
==10906==     in use at exit: 3,134,024 bytes in 69,387 blocks
==10906==   total heap usage: 1,736,245 allocs, 1,666,858 frees, 139,848,575 bytes allocated
==10906== 
==10906== Searching for pointers to 69,387 not-freed blocks
--10906--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10906--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10906--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10906--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10906--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10906--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10906--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10906--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10906--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10906--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10906--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10906--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10906--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10906--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10906--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10906--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10906--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10906--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10906--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10906--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10906--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10906--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10906--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10906--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10906--   Scanning root segment: 0x701a000..0x701afff (4096)
--10906--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10906--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10906--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10906--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10906--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10906--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10906--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10906--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10906--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10906--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10906== Checked 4,795,128 bytes
==10906== 
==10906== LEAK SUMMARY:
==10906==    definitely lost: 3,173 bytes in 18 blocks
==10906==    indirectly lost: 6,756 bytes in 7 blocks
==10906==      possibly lost: 0 bytes in 0 blocks
==10906==    still reachable: 3,124,095 bytes in 69,362 blocks
==10906==         suppressed: 0 bytes in 0 blocks
==10906== Rerun with --leak-check=full to see details of leaked memory
==10906== 
==10906== Use --track-origins=yes to see where uninitialised values come from
==10906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10906== 
==10906== 1 errors in context 1 of 2:
==10906== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10906==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10906==    by 0x488CD0: stringsubst (subst.c:301)
==10906==    by 0x48801B: prefork (subst.c:77)
==10906==    by 0x42B318: execcmd (exec.c:2619)
==10906==    by 0x428CA0: execpline2 (exec.c:1697)
==10906==    by 0x427FD2: execpline (exec.c:1484)
==10906==    by 0x427756: execlist (exec.c:1267)
==10906==    by 0x42717C: execode (exec.c:1073)
==10906==    by 0x431299: runshfunc (exec.c:5040)
==10906==    by 0x430E76: doshfunc (exec.c:4920)
==10906==    by 0x4302FB: execshfunc (exec.c:4557)
==10906==    by 0x42D8C1: execcmd (exec.c:3373)
==10906== 
==10906== 
==10906== 2 errors in context 2 of 2:
==10906== Conditional jump or move depends on uninitialised value(s)
==10906==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10906==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10906==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10906==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10906==    by 0x42D8E9: execcmd (exec.c:3378)
==10906==    by 0x428CA0: execpline2 (exec.c:1697)
==10906==    by 0x427FD2: execpline (exec.c:1484)
==10906==    by 0x42779A: execlist (exec.c:1275)
==10906==    by 0x42717C: execode (exec.c:1073)
==10906==    by 0x431299: runshfunc (exec.c:5040)
==10906==    by 0x430E76: doshfunc (exec.c:4920)
==10906==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10906== 
==10906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10909== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10909-by-pythonnut-on-???
==10909== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10909-by-pythonnut-on-???
==10909== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10909-by-pythonnut-on-???
==10909== 
==10909== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10909== don't want to do, unless you know exactly what you're doing,
==10909== or are doing some strange experiment):
==10909==   /usr/lib/valgrind/../../bin/vgdb --pid=10909 ...command...
==10909== 
==10909== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10909==   /path/to/gdb ./zsh
==10909== and then give GDB the following command
==10909==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10909
==10909== --pid is optional if only one valgrind process is running
==10909== 
--10909-- Caught __NR_exit; running __libc_freeres()
--10909-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10909== 
==10909== HEAP SUMMARY:
==10909==     in use at exit: 3,134,115 bytes in 69,387 blocks
==10909==   total heap usage: 1,736,252 allocs, 1,666,865 frees, 139,851,607 bytes allocated
==10909== 
==10909== Searching for pointers to 69,387 not-freed blocks
--10909--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10909--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10909--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10909--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10909--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10909--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10909--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10909--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10909--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10909--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10909--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10909--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10909--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10909--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10909--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10909--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10909--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10909--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10909--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10909--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10909--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10909--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10909--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10909--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10909--   Scanning root segment: 0x701a000..0x701afff (4096)
--10909--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10909--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10909--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10909--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10909--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10909--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10909--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10909--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10909--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10909--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10909== Checked 4,796,568 bytes
==10909== 
==10909== LEAK SUMMARY:
==10909==    definitely lost: 3,173 bytes in 18 blocks
==10909==    indirectly lost: 6,756 bytes in 7 blocks
==10909==      possibly lost: 0 bytes in 0 blocks
==10909==    still reachable: 3,124,186 bytes in 69,362 blocks
==10909==         suppressed: 0 bytes in 0 blocks
==10909== Rerun with --leak-check=full to see details of leaked memory
==10909== 
==10909== Use --track-origins=yes to see where uninitialised values come from
==10909== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10909== 
==10909== 1 errors in context 1 of 2:
==10909== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10909==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10909==    by 0x488CD0: stringsubst (subst.c:301)
==10909==    by 0x48801B: prefork (subst.c:77)
==10909==    by 0x42B318: execcmd (exec.c:2619)
==10909==    by 0x428CA0: execpline2 (exec.c:1697)
==10909==    by 0x427FD2: execpline (exec.c:1484)
==10909==    by 0x427756: execlist (exec.c:1267)
==10909==    by 0x42717C: execode (exec.c:1073)
==10909==    by 0x431299: runshfunc (exec.c:5040)
==10909==    by 0x430E76: doshfunc (exec.c:4920)
==10909==    by 0x4302FB: execshfunc (exec.c:4557)
==10909==    by 0x42D8C1: execcmd (exec.c:3373)
==10909== 
==10909== 
==10909== 2 errors in context 2 of 2:
==10909== Conditional jump or move depends on uninitialised value(s)
==10909==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10909==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10909==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10909==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10909==    by 0x42D8E9: execcmd (exec.c:3378)
==10909==    by 0x428CA0: execpline2 (exec.c:1697)
==10909==    by 0x427FD2: execpline (exec.c:1484)
==10909==    by 0x42779A: execlist (exec.c:1275)
==10909==    by 0x42717C: execode (exec.c:1073)
==10909==    by 0x431299: runshfunc (exec.c:5040)
==10909==    by 0x430E76: doshfunc (exec.c:4920)
==10909==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10909== 
==10909== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10911== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10911-by-pythonnut-on-???
==10911== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10911-by-pythonnut-on-???
==10911== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10911-by-pythonnut-on-???
==10911== 
==10911== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10911== don't want to do, unless you know exactly what you're doing,
==10911== or are doing some strange experiment):
==10911==   /usr/lib/valgrind/../../bin/vgdb --pid=10911 ...command...
==10911== 
==10911== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10911==   /path/to/gdb ./zsh
==10911== and then give GDB the following command
==10911==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10911
==10911== --pid is optional if only one valgrind process is running
==10911== 
--10911-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--10911-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10911== 
==10911== HEAP SUMMARY:
==10911==     in use at exit: 3,131,314 bytes in 69,317 blocks
==10911==   total heap usage: 1,736,483 allocs, 1,667,166 frees, 139,877,271 bytes allocated
==10911== 
==10911== Searching for pointers to 69,317 not-freed blocks
--10911--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10911--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10911--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10911--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10911--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10911--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10911--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10911--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10911--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10911--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10911--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10911--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10911--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10911--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10911--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10911--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10911--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10911--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10911--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10911--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10911--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10911--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10911--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10911--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10911--   Scanning root segment: 0x701a000..0x701afff (4096)
--10911--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10911--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10911--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10911--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10911--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10911--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10911--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10911--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10911--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10911--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10911== Checked 4,789,832 bytes
==10911== 
==10911== LEAK SUMMARY:
==10911==    definitely lost: 3,173 bytes in 18 blocks
==10911==    indirectly lost: 6,756 bytes in 7 blocks
==10911==      possibly lost: 0 bytes in 0 blocks
==10911==    still reachable: 3,121,385 bytes in 69,292 blocks
==10911==         suppressed: 0 bytes in 0 blocks
==10911== Rerun with --leak-check=full to see details of leaked memory
==10911== 
==10911== Use --track-origins=yes to see where uninitialised values come from
==10911== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10911== 
==10911== 1 errors in context 1 of 2:
==10911== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10911==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10911==    by 0x488CD0: stringsubst (subst.c:301)
==10911==    by 0x48801B: prefork (subst.c:77)
==10911==    by 0x42B318: execcmd (exec.c:2619)
==10911==    by 0x428CA0: execpline2 (exec.c:1697)
==10911==    by 0x427FD2: execpline (exec.c:1484)
==10911==    by 0x427756: execlist (exec.c:1267)
==10911==    by 0x42717C: execode (exec.c:1073)
==10911==    by 0x431299: runshfunc (exec.c:5040)
==10911==    by 0x430E76: doshfunc (exec.c:4920)
==10911==    by 0x4302FB: execshfunc (exec.c:4557)
==10911==    by 0x42D8C1: execcmd (exec.c:3373)
==10911== 
==10911== 
==10911== 2 errors in context 2 of 2:
==10911== Conditional jump or move depends on uninitialised value(s)
==10911==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10911==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10911==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10911==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10911==    by 0x42D8E9: execcmd (exec.c:3378)
==10911==    by 0x428CA0: execpline2 (exec.c:1697)
==10911==    by 0x427FD2: execpline (exec.c:1484)
==10911==    by 0x42779A: execlist (exec.c:1275)
==10911==    by 0x42717C: execode (exec.c:1073)
==10911==    by 0x431299: runshfunc (exec.c:5040)
==10911==    by 0x430E76: doshfunc (exec.c:4920)
==10911==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10911== 
==10911== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10910-- Caught __NR_exit; running __libc_freeres()
==10910== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10910-by-pythonnut-on-???
==10910== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10910-by-pythonnut-on-???
==10910== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10910-by-pythonnut-on-???
==10910== 
==10910== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10910== don't want to do, unless you know exactly what you're doing,
==10910== or are doing some strange experiment):
==10910==   /usr/lib/valgrind/../../bin/vgdb --pid=10910 ...command...
==10910== 
==10910== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10910==   /path/to/gdb ./zsh
==10910== and then give GDB the following command
==10910==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10910
==10910== --pid is optional if only one valgrind process is running
==10910== 
--10910-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10910== 
==10910== HEAP SUMMARY:
==10910==     in use at exit: 3,131,250 bytes in 69,314 blocks
==10910==   total heap usage: 1,736,481 allocs, 1,667,167 frees, 139,877,030 bytes allocated
==10910== 
==10910== Searching for pointers to 69,314 not-freed blocks
--10910--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10910--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10910--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10910--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10910--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10910--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10910--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10910--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10910--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10910--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10910--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10910--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10910--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10910--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10910--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10910--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10910--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10910--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10910--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10910--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10910--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10910--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10910--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10910--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10910--   Scanning root segment: 0x701a000..0x701afff (4096)
--10910--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10910--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10910--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10910--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10910--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10910--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10910--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10910--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10910--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10910--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10910== Checked 4,789,144 bytes
==10910== 
==10910== LEAK SUMMARY:
==10910==    definitely lost: 3,173 bytes in 18 blocks
==10910==    indirectly lost: 6,756 bytes in 7 blocks
==10910==      possibly lost: 0 bytes in 0 blocks
==10910==    still reachable: 3,121,321 bytes in 69,289 blocks
==10910==         suppressed: 0 bytes in 0 blocks
==10910== Rerun with --leak-check=full to see details of leaked memory
==10910== 
==10910== Use --track-origins=yes to see where uninitialised values come from
==10910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10910== 
==10910== 1 errors in context 1 of 2:
==10910== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10910==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10910==    by 0x488CD0: stringsubst (subst.c:301)
==10910==    by 0x48801B: prefork (subst.c:77)
==10910==    by 0x42B318: execcmd (exec.c:2619)
==10910==    by 0x428CA0: execpline2 (exec.c:1697)
==10910==    by 0x427FD2: execpline (exec.c:1484)
==10910==    by 0x427756: execlist (exec.c:1267)
==10910==    by 0x42717C: execode (exec.c:1073)
==10910==    by 0x431299: runshfunc (exec.c:5040)
==10910==    by 0x430E76: doshfunc (exec.c:4920)
==10910==    by 0x4302FB: execshfunc (exec.c:4557)
==10910==    by 0x42D8C1: execcmd (exec.c:3373)
==10910== 
==10910== 
==10910== 2 errors in context 2 of 2:
==10910== Conditional jump or move depends on uninitialised value(s)
==10910==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10910==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10910==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10910==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10910==    by 0x42D8E9: execcmd (exec.c:3378)
==10910==    by 0x428CA0: execpline2 (exec.c:1697)
==10910==    by 0x427FD2: execpline (exec.c:1484)
==10910==    by 0x42779A: execlist (exec.c:1275)
==10910==    by 0x42717C: execode (exec.c:1073)
==10910==    by 0x431299: runshfunc (exec.c:5040)
==10910==    by 0x430E76: doshfunc (exec.c:4920)
==10910==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10910== 
==10910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10913-- Caught __NR_exit; running __libc_freeres()
==10913== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10913-by-pythonnut-on-???
==10913== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10913-by-pythonnut-on-???
==10913== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10913-by-pythonnut-on-???
==10913== 
==10913== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10913== don't want to do, unless you know exactly what you're doing,
==10913== or are doing some strange experiment):
==10913==   /usr/lib/valgrind/../../bin/vgdb --pid=10913 ...command...
==10913== 
==10913== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10913==   /path/to/gdb ./zsh
==10913== and then give GDB the following command
==10913==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10913
==10913== --pid is optional if only one valgrind process is running
==10913== 
--10913-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10913== 
==10913== HEAP SUMMARY:
==10913==     in use at exit: 3,131,257 bytes in 69,314 blocks
==10913==   total heap usage: 1,736,496 allocs, 1,667,182 frees, 139,882,028 bytes allocated
==10913== 
==10913== Searching for pointers to 69,314 not-freed blocks
--10913--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10913--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10913--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10913--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10913--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10913--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10913--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10913--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10913--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10913--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10913--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10913--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10913--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10913--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10913--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10913--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10913--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10913--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10913--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10913--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10913--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10913--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10913--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10913--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10913--   Scanning root segment: 0x701a000..0x701afff (4096)
--10913--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10913--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10913--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10913--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10913--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10913--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10913--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10913--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10913--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10913--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10913== Checked 4,789,280 bytes
==10913== 
==10913== LEAK SUMMARY:
==10913==    definitely lost: 3,173 bytes in 18 blocks
==10913==    indirectly lost: 6,756 bytes in 7 blocks
==10913==      possibly lost: 0 bytes in 0 blocks
==10913==    still reachable: 3,121,328 bytes in 69,289 blocks
==10913==         suppressed: 0 bytes in 0 blocks
==10913== Rerun with --leak-check=full to see details of leaked memory
==10913== 
==10913== Use --track-origins=yes to see where uninitialised values come from
==10913== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10913== 
==10913== 1 errors in context 1 of 2:
==10913== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10913==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10913==    by 0x488CD0: stringsubst (subst.c:301)
==10913==    by 0x48801B: prefork (subst.c:77)
==10913==    by 0x42B318: execcmd (exec.c:2619)
==10913==    by 0x428CA0: execpline2 (exec.c:1697)
==10913==    by 0x427FD2: execpline (exec.c:1484)
==10913==    by 0x427756: execlist (exec.c:1267)
==10913==    by 0x42717C: execode (exec.c:1073)
==10913==    by 0x431299: runshfunc (exec.c:5040)
==10913==    by 0x430E76: doshfunc (exec.c:4920)
==10913==    by 0x4302FB: execshfunc (exec.c:4557)
==10913==    by 0x42D8C1: execcmd (exec.c:3373)
==10913== 
==10913== 
==10913== 2 errors in context 2 of 2:
==10913== Conditional jump or move depends on uninitialised value(s)
==10913==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10913==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10913==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10913==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10913==    by 0x42D8E9: execcmd (exec.c:3378)
==10913==    by 0x428CA0: execpline2 (exec.c:1697)
==10913==    by 0x427FD2: execpline (exec.c:1484)
==10913==    by 0x42779A: execlist (exec.c:1275)
==10913==    by 0x42717C: execode (exec.c:1073)
==10913==    by 0x431299: runshfunc (exec.c:5040)
==10913==    by 0x430E76: doshfunc (exec.c:4920)
==10913==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10913== 
==10913== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10914-- Caught __NR_exit; running __libc_freeres()
==10914== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10914-by-pythonnut-on-???
==10914== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10914-by-pythonnut-on-???
==10914== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10914-by-pythonnut-on-???
==10914== 
==10914== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10914== don't want to do, unless you know exactly what you're doing,
==10914== or are doing some strange experiment):
==10914==   /usr/lib/valgrind/../../bin/vgdb --pid=10914 ...command...
==10914== 
==10914== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10914==   /path/to/gdb ./zsh
==10914== and then give GDB the following command
==10914==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10914
==10914== --pid is optional if only one valgrind process is running
==10914== 
--10914-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10914== 
==10914== HEAP SUMMARY:
==10914==     in use at exit: 3,131,353 bytes in 69,314 blocks
==10914==   total heap usage: 1,736,512 allocs, 1,667,198 frees, 139,886,815 bytes allocated
==10914== 
==10914== Searching for pointers to 69,314 not-freed blocks
--10914--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10914--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10914--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10914--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10914--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10914--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10914--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10914--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10914--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10914--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10914--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10914--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10914--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10914--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10914--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10914--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10914--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10914--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10914--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10914--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10914--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10914--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10914--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10914--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10914--   Scanning root segment: 0x701a000..0x701afff (4096)
--10914--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10914--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10914--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10914--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10914--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10914--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10914--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10914--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10914--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10914--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10914== Checked 4,788,560 bytes
==10914== 
==10914== LEAK SUMMARY:
==10914==    definitely lost: 3,173 bytes in 18 blocks
==10914==    indirectly lost: 6,756 bytes in 7 blocks
==10914==      possibly lost: 0 bytes in 0 blocks
==10914==    still reachable: 3,121,424 bytes in 69,289 blocks
==10914==         suppressed: 0 bytes in 0 blocks
==10914== Rerun with --leak-check=full to see details of leaked memory
==10914== 
==10914== Use --track-origins=yes to see where uninitialised values come from
==10914== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10914== 
==10914== 1 errors in context 1 of 2:
==10914== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10914==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10914==    by 0x488CD0: stringsubst (subst.c:301)
==10914==    by 0x48801B: prefork (subst.c:77)
==10914==    by 0x42B318: execcmd (exec.c:2619)
==10914==    by 0x428CA0: execpline2 (exec.c:1697)
==10914==    by 0x427FD2: execpline (exec.c:1484)
==10914==    by 0x427756: execlist (exec.c:1267)
==10914==    by 0x42717C: execode (exec.c:1073)
==10914==    by 0x431299: runshfunc (exec.c:5040)
==10914==    by 0x430E76: doshfunc (exec.c:4920)
==10914==    by 0x4302FB: execshfunc (exec.c:4557)
==10914==    by 0x42D8C1: execcmd (exec.c:3373)
==10914== 
==10914== 
==10914== 2 errors in context 2 of 2:
==10914== Conditional jump or move depends on uninitialised value(s)
==10914==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10914==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10914==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10914==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10914==    by 0x42D8E9: execcmd (exec.c:3378)
==10914==    by 0x428CA0: execpline2 (exec.c:1697)
==10914==    by 0x427FD2: execpline (exec.c:1484)
==10914==    by 0x42779A: execlist (exec.c:1275)
==10914==    by 0x42717C: execode (exec.c:1073)
==10914==    by 0x431299: runshfunc (exec.c:5040)
==10914==    by 0x430E76: doshfunc (exec.c:4920)
==10914==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10914== 
==10914== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10917== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10917-by-pythonnut-on-???
==10917== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10917-by-pythonnut-on-???
==10917== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10917-by-pythonnut-on-???
==10917== 
==10917== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10917== don't want to do, unless you know exactly what you're doing,
==10917== or are doing some strange experiment):
==10917==   /usr/lib/valgrind/../../bin/vgdb --pid=10917 ...command...
==10917== 
==10917== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10917==   /path/to/gdb ./zsh
==10917== and then give GDB the following command
==10917==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10917
==10917== --pid is optional if only one valgrind process is running
==10917== 
--10917-- Caught __NR_exit; running __libc_freeres()
--10917-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10917== 
==10917== HEAP SUMMARY:
==10917==     in use at exit: 3,131,599 bytes in 69,320 blocks
==10917==   total heap usage: 1,736,560 allocs, 1,667,240 frees, 139,895,839 bytes allocated
==10917== 
==10917== Searching for pointers to 69,320 not-freed blocks
--10917--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10917--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10917--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10917--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10917--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10917--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10917--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10917--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10917--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10917--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10917--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10917--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10917--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10917--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10917--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10917--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10917--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10917--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10917--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10917--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10917--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10917--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10917--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10917--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10917--   Scanning root segment: 0x701a000..0x701afff (4096)
--10917--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10917--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10917--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10917--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10917--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10917--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10917--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10917--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10917--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10917--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10917== Checked 4,788,736 bytes
==10917== 
==10917== LEAK SUMMARY:
==10917==    definitely lost: 3,173 bytes in 18 blocks
==10917==    indirectly lost: 6,756 bytes in 7 blocks
==10917==      possibly lost: 0 bytes in 0 blocks
==10917==    still reachable: 3,121,670 bytes in 69,295 blocks
==10917==         suppressed: 0 bytes in 0 blocks
==10917== Rerun with --leak-check=full to see details of leaked memory
==10917== 
==10917== Use --track-origins=yes to see where uninitialised values come from
==10917== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10917== 
==10917== 1 errors in context 1 of 2:
==10917== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10917==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10917==    by 0x488CD0: stringsubst (subst.c:301)
==10917==    by 0x48801B: prefork (subst.c:77)
==10917==    by 0x42B318: execcmd (exec.c:2619)
==10917==    by 0x428CA0: execpline2 (exec.c:1697)
==10917==    by 0x427FD2: execpline (exec.c:1484)
==10917==    by 0x427756: execlist (exec.c:1267)
==10917==    by 0x42717C: execode (exec.c:1073)
==10917==    by 0x431299: runshfunc (exec.c:5040)
==10917==    by 0x430E76: doshfunc (exec.c:4920)
==10917==    by 0x4302FB: execshfunc (exec.c:4557)
==10917==    by 0x42D8C1: execcmd (exec.c:3373)
==10917== 
==10917== 
==10917== 2 errors in context 2 of 2:
==10917== Conditional jump or move depends on uninitialised value(s)
==10917==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10917==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10917==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10917==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10917==    by 0x42D8E9: execcmd (exec.c:3378)
==10917==    by 0x428CA0: execpline2 (exec.c:1697)
==10917==    by 0x427FD2: execpline (exec.c:1484)
==10917==    by 0x42779A: execlist (exec.c:1275)
==10917==    by 0x42717C: execode (exec.c:1073)
==10917==    by 0x431299: runshfunc (exec.c:5040)
==10917==    by 0x430E76: doshfunc (exec.c:4920)
==10917==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10917== 
==10917== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10918-- Caught __NR_exit; running __libc_freeres()
==10918== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10918-by-pythonnut-on-???
==10918== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10918-by-pythonnut-on-???
==10918== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10918-by-pythonnut-on-???
==10918== 
==10918== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10918== don't want to do, unless you know exactly what you're doing,
==10918== or are doing some strange experiment):
==10918==   /usr/lib/valgrind/../../bin/vgdb --pid=10918 ...command...
==10918== 
==10918== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10918==   /path/to/gdb ./zsh
==10918== and then give GDB the following command
==10918==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10918
==10918== --pid is optional if only one valgrind process is running
==10918== 
--10918-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10918== 
==10918== HEAP SUMMARY:
==10918==     in use at exit: 3,131,535 bytes in 69,320 blocks
==10918==   total heap usage: 1,736,540 allocs, 1,667,220 frees, 139,893,609 bytes allocated
==10918== 
==10918== Searching for pointers to 69,320 not-freed blocks
--10918--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10918--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10918--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10918--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10918--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10918--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10918--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10918--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10918--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10918--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10918--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10918--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10918--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10918--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10918--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10918--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10918--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10918--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10918--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10918--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10918--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10918--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10918--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10918--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10918--   Scanning root segment: 0x701a000..0x701afff (4096)
--10918--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10918--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10918--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10918--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10918--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10918--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10918--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10918--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10918--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10918--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10918== Checked 4,788,656 bytes
==10918== 
==10918== LEAK SUMMARY:
==10918==    definitely lost: 3,173 bytes in 18 blocks
==10918==    indirectly lost: 6,756 bytes in 7 blocks
==10918==      possibly lost: 0 bytes in 0 blocks
==10918==    still reachable: 3,121,606 bytes in 69,295 blocks
==10918==         suppressed: 0 bytes in 0 blocks
==10918== Rerun with --leak-check=full to see details of leaked memory
==10918== 
==10918== Use --track-origins=yes to see where uninitialised values come from
==10918== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10918== 
==10918== 1 errors in context 1 of 2:
==10918== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10918==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10918==    by 0x488CD0: stringsubst (subst.c:301)
==10918==    by 0x48801B: prefork (subst.c:77)
==10918==    by 0x42B318: execcmd (exec.c:2619)
==10918==    by 0x428CA0: execpline2 (exec.c:1697)
==10918==    by 0x427FD2: execpline (exec.c:1484)
==10918==    by 0x427756: execlist (exec.c:1267)
==10918==    by 0x42717C: execode (exec.c:1073)
==10918==    by 0x431299: runshfunc (exec.c:5040)
==10918==    by 0x430E76: doshfunc (exec.c:4920)
==10918==    by 0x4302FB: execshfunc (exec.c:4557)
==10918==    by 0x42D8C1: execcmd (exec.c:3373)
==10918== 
==10918== 
==10918== 2 errors in context 2 of 2:
==10918== Conditional jump or move depends on uninitialised value(s)
==10918==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10918==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10918==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10918==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10918==    by 0x42D8E9: execcmd (exec.c:3378)
==10918==    by 0x428CA0: execpline2 (exec.c:1697)
==10918==    by 0x427FD2: execpline (exec.c:1484)
==10918==    by 0x42779A: execlist (exec.c:1275)
==10918==    by 0x42717C: execode (exec.c:1073)
==10918==    by 0x431299: runshfunc (exec.c:5040)
==10918==    by 0x430E76: doshfunc (exec.c:4920)
==10918==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10918== 
==10918== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10919== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10919-by-pythonnut-on-???
==10919== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10919-by-pythonnut-on-???
==10919== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10919-by-pythonnut-on-???
==10919== 
==10919== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10919== don't want to do, unless you know exactly what you're doing,
==10919== or are doing some strange experiment):
==10919==   /usr/lib/valgrind/../../bin/vgdb --pid=10919 ...command...
==10919== 
==10919== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10919==   /path/to/gdb ./zsh
==10919== and then give GDB the following command
==10919==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10919
==10919== --pid is optional if only one valgrind process is running
==10919== 
--10919-- Caught __NR_exit; running __libc_freeres()
--10919-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10919== 
==10919== HEAP SUMMARY:
==10919==     in use at exit: 3,131,563 bytes in 69,321 blocks
==10919==   total heap usage: 1,736,553 allocs, 1,667,232 frees, 139,896,296 bytes allocated
==10919== 
==10919== Searching for pointers to 69,321 not-freed blocks
--10919--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10919--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10919--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10919--   Scanning root segment: 0x4037000..0x403afff (16384)
--10919--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10919--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10919--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10919--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10919--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10919--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10919--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10919--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10919--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10919--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10919--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10919--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10919--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10919--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10919--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10919--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10919--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10919--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10919--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10919--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10919--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10919--   Scanning root segment: 0x701a000..0x701afff (4096)
--10919--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10919--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10919--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10919--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10919--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10919--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10919--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10919--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10919--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10919--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10919== Checked 4,804,552 bytes
==10919== 
==10919== LEAK SUMMARY:
==10919==    definitely lost: 3,173 bytes in 18 blocks
==10919==    indirectly lost: 6,756 bytes in 7 blocks
==10919==      possibly lost: 0 bytes in 0 blocks
==10919==    still reachable: 3,121,634 bytes in 69,296 blocks
==10919==         suppressed: 0 bytes in 0 blocks
==10919== Rerun with --leak-check=full to see details of leaked memory
==10919== 
==10919== Use --track-origins=yes to see where uninitialised values come from
==10919== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10919== 
==10919== 1 errors in context 1 of 2:
==10919== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10919==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10919==    by 0x488CD0: stringsubst (subst.c:301)
==10919==    by 0x48801B: prefork (subst.c:77)
==10919==    by 0x42B318: execcmd (exec.c:2619)
==10919==    by 0x428CA0: execpline2 (exec.c:1697)
==10919==    by 0x427FD2: execpline (exec.c:1484)
==10919==    by 0x427756: execlist (exec.c:1267)
==10919==    by 0x42717C: execode (exec.c:1073)
==10919==    by 0x431299: runshfunc (exec.c:5040)
==10919==    by 0x430E76: doshfunc (exec.c:4920)
==10919==    by 0x4302FB: execshfunc (exec.c:4557)
==10919==    by 0x42D8C1: execcmd (exec.c:3373)
==10919== 
==10919== 
==10919== 2 errors in context 2 of 2:
==10919== Conditional jump or move depends on uninitialised value(s)
==10919==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10919==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10919==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10919==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10919==    by 0x42D8E9: execcmd (exec.c:3378)
==10919==    by 0x428CA0: execpline2 (exec.c:1697)
==10919==    by 0x427FD2: execpline (exec.c:1484)
==10919==    by 0x42779A: execlist (exec.c:1275)
==10919==    by 0x42717C: execode (exec.c:1073)
==10919==    by 0x431299: runshfunc (exec.c:5040)
==10919==    by 0x430E76: doshfunc (exec.c:4920)
==10919==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10919== 
==10919== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10920-- Caught __NR_exit; running __libc_freeres()
==10920== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10920-by-pythonnut-on-???
==10920== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10920-by-pythonnut-on-???
==10920== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10920-by-pythonnut-on-???
==10920== 
==10920== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10920== don't want to do, unless you know exactly what you're doing,
==10920== or are doing some strange experiment):
==10920==   /usr/lib/valgrind/../../bin/vgdb --pid=10920 ...command...
==10920== 
==10920== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10920==   /path/to/gdb ./zsh
==10920== and then give GDB the following command
==10920==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10920
==10920== --pid is optional if only one valgrind process is running
==10920== 
--10920-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10920== 
==10920== HEAP SUMMARY:
==10920==     in use at exit: 3,131,620 bytes in 69,319 blocks
==10920==   total heap usage: 1,736,988 allocs, 1,667,669 frees, 139,939,428 bytes allocated
==10920== 
==10920== Searching for pointers to 69,319 not-freed blocks
--10920--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10920--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10920--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10920--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10920--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10920--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10920--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10920--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10920--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10920--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10920--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10920--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10920--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10920--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10920--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10920--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10920--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10920--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10920--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10920--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10920--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10920--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10920--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10920--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10920--   Scanning root segment: 0x701a000..0x701afff (4096)
--10920--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10920--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10920--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10920--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10920--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10920--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10920--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10920--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10920--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10920--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10920== Checked 4,789,864 bytes
==10920== 
==10920== LEAK SUMMARY:
==10920==    definitely lost: 3,173 bytes in 18 blocks
==10920==    indirectly lost: 6,756 bytes in 7 blocks
==10920==      possibly lost: 0 bytes in 0 blocks
==10920==    still reachable: 3,121,691 bytes in 69,294 blocks
==10920==         suppressed: 0 bytes in 0 blocks
==10920== Rerun with --leak-check=full to see details of leaked memory
==10920== 
==10920== Use --track-origins=yes to see where uninitialised values come from
==10920== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10920== 
==10920== 1 errors in context 1 of 2:
==10920== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10920==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10920==    by 0x488CD0: stringsubst (subst.c:301)
==10920==    by 0x48801B: prefork (subst.c:77)
==10920==    by 0x42B318: execcmd (exec.c:2619)
==10920==    by 0x428CA0: execpline2 (exec.c:1697)
==10920==    by 0x427FD2: execpline (exec.c:1484)
==10920==    by 0x427756: execlist (exec.c:1267)
==10920==    by 0x42717C: execode (exec.c:1073)
==10920==    by 0x431299: runshfunc (exec.c:5040)
==10920==    by 0x430E76: doshfunc (exec.c:4920)
==10920==    by 0x4302FB: execshfunc (exec.c:4557)
==10920==    by 0x42D8C1: execcmd (exec.c:3373)
==10920== 
==10920== 
==10920== 2 errors in context 2 of 2:
==10920== Conditional jump or move depends on uninitialised value(s)
==10920==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10920==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10920==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10920==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10920==    by 0x42D8E9: execcmd (exec.c:3378)
==10920==    by 0x428CA0: execpline2 (exec.c:1697)
==10920==    by 0x427FD2: execpline (exec.c:1484)
==10920==    by 0x42779A: execlist (exec.c:1275)
==10920==    by 0x42717C: execode (exec.c:1073)
==10920==    by 0x431299: runshfunc (exec.c:5040)
==10920==    by 0x430E76: doshfunc (exec.c:4920)
==10920==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10920== 
==10920== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10921== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10921-by-pythonnut-on-???
==10921== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10921-by-pythonnut-on-???
==10921== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10921-by-pythonnut-on-???
==10921== 
==10921== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10921== don't want to do, unless you know exactly what you're doing,
==10921== or are doing some strange experiment):
==10921==   /usr/lib/valgrind/../../bin/vgdb --pid=10921 ...command...
==10921== 
==10921== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10921==   /path/to/gdb ./zsh
==10921== and then give GDB the following command
==10921==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10921
==10921== --pid is optional if only one valgrind process is running
==10921== 
--10921-- Caught __NR_exit; running __libc_freeres()
--10921-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10921== 
==10921== HEAP SUMMARY:
==10921==     in use at exit: 3,138,594 bytes in 69,516 blocks
==10921==   total heap usage: 1,737,268 allocs, 1,667,752 frees, 139,957,438 bytes allocated
==10921== 
==10921== Searching for pointers to 69,516 not-freed blocks
--10921--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10921--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10921--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10921--   Scanning root segment: 0x4037000..0x403afff (16384)
--10921--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10921--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10921--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10921--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10921--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10921--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10921--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10921--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10921--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10921--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10921--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10921--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10921--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10921--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10921--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10921--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10921--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10921--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10921--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10921--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10921--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10921--   Scanning root segment: 0x701a000..0x701afff (4096)
--10921--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10921--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10921--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10921--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10921--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10921--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10921--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10921--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10921--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10921--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10921== Checked 4,820,752 bytes
==10921== 
==10921== LEAK SUMMARY:
==10921==    definitely lost: 3,173 bytes in 18 blocks
==10921==    indirectly lost: 6,756 bytes in 7 blocks
==10921==      possibly lost: 0 bytes in 0 blocks
==10921==    still reachable: 3,128,665 bytes in 69,491 blocks
==10921==         suppressed: 0 bytes in 0 blocks
==10921== Rerun with --leak-check=full to see details of leaked memory
==10921== 
==10921== Use --track-origins=yes to see where uninitialised values come from
==10921== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10921== 
==10921== 1 errors in context 1 of 2:
==10921== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10921==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10921==    by 0x488CD0: stringsubst (subst.c:301)
==10921==    by 0x48801B: prefork (subst.c:77)
==10921==    by 0x42B318: execcmd (exec.c:2619)
==10921==    by 0x428CA0: execpline2 (exec.c:1697)
==10921==    by 0x427FD2: execpline (exec.c:1484)
==10921==    by 0x427756: execlist (exec.c:1267)
==10921==    by 0x42717C: execode (exec.c:1073)
==10921==    by 0x431299: runshfunc (exec.c:5040)
==10921==    by 0x430E76: doshfunc (exec.c:4920)
==10921==    by 0x4302FB: execshfunc (exec.c:4557)
==10921==    by 0x42D8C1: execcmd (exec.c:3373)
==10921== 
==10921== 
==10921== 2 errors in context 2 of 2:
==10921== Conditional jump or move depends on uninitialised value(s)
==10921==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10921==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10921==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10921==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10921==    by 0x42D8E9: execcmd (exec.c:3378)
==10921==    by 0x428CA0: execpline2 (exec.c:1697)
==10921==    by 0x427FD2: execpline (exec.c:1484)
==10921==    by 0x42779A: execlist (exec.c:1275)
==10921==    by 0x42717C: execode (exec.c:1073)
==10921==    by 0x431299: runshfunc (exec.c:5040)
==10921==    by 0x430E76: doshfunc (exec.c:4920)
==10921==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10921== 
==10921== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10922== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10922-by-pythonnut-on-???
==10922== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10922-by-pythonnut-on-???
==10922== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10922-by-pythonnut-on-???
==10922== 
==10922== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10922== don't want to do, unless you know exactly what you're doing,
==10922== or are doing some strange experiment):
==10922==   /usr/lib/valgrind/../../bin/vgdb --pid=10922 ...command...
==10922== 
==10922== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10922==   /path/to/gdb ./zsh
==10922== and then give GDB the following command
==10922==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10922
==10922== --pid is optional if only one valgrind process is running
==10922== 
--10922-- Caught __NR_exit; running __libc_freeres()
--10922-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10922== 
==10922== HEAP SUMMARY:
==10922==     in use at exit: 3,138,737 bytes in 69,516 blocks
==10922==   total heap usage: 1,737,276 allocs, 1,667,760 frees, 139,960,494 bytes allocated
==10922== 
==10922== Searching for pointers to 69,516 not-freed blocks
--10922--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10922--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10922--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10922--   Scanning root segment: 0x4037000..0x403afff (16384)
--10922--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10922--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10922--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10922--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10922--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10922--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10922--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10922--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10922--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10922--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10922--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10922--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10922--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10922--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10922--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10922--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10922--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10922--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10922--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10922--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10922--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10922--   Scanning root segment: 0x701a000..0x701afff (4096)
--10922--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10922--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10922--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10922--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10922--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10922--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10922--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10922--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10922--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10922--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10922== Checked 4,822,248 bytes
==10922== 
==10922== LEAK SUMMARY:
==10922==    definitely lost: 3,173 bytes in 18 blocks
==10922==    indirectly lost: 6,756 bytes in 7 blocks
==10922==      possibly lost: 0 bytes in 0 blocks
==10922==    still reachable: 3,128,808 bytes in 69,491 blocks
==10922==         suppressed: 0 bytes in 0 blocks
==10922== Rerun with --leak-check=full to see details of leaked memory
==10922== 
==10922== Use --track-origins=yes to see where uninitialised values come from
==10922== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10922== 
==10922== 1 errors in context 1 of 2:
==10922== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10922==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10922==    by 0x488CD0: stringsubst (subst.c:301)
==10922==    by 0x48801B: prefork (subst.c:77)
==10922==    by 0x42B318: execcmd (exec.c:2619)
==10922==    by 0x428CA0: execpline2 (exec.c:1697)
==10922==    by 0x427FD2: execpline (exec.c:1484)
==10922==    by 0x427756: execlist (exec.c:1267)
==10922==    by 0x42717C: execode (exec.c:1073)
==10922==    by 0x431299: runshfunc (exec.c:5040)
==10922==    by 0x430E76: doshfunc (exec.c:4920)
==10922==    by 0x4302FB: execshfunc (exec.c:4557)
==10922==    by 0x42D8C1: execcmd (exec.c:3373)
==10922== 
==10922== 
==10922== 2 errors in context 2 of 2:
==10922== Conditional jump or move depends on uninitialised value(s)
==10922==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10922==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10922==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10922==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10922==    by 0x42D8E9: execcmd (exec.c:3378)
==10922==    by 0x428CA0: execpline2 (exec.c:1697)
==10922==    by 0x427FD2: execpline (exec.c:1484)
==10922==    by 0x42779A: execlist (exec.c:1275)
==10922==    by 0x42717C: execode (exec.c:1073)
==10922==    by 0x431299: runshfunc (exec.c:5040)
==10922==    by 0x430E76: doshfunc (exec.c:4920)
==10922==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10922== 
==10922== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10925== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10925-by-pythonnut-on-???
==10925== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10925-by-pythonnut-on-???
==10925== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10925-by-pythonnut-on-???
==10925== 
==10925== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10925== don't want to do, unless you know exactly what you're doing,
==10925== or are doing some strange experiment):
==10925==   /usr/lib/valgrind/../../bin/vgdb --pid=10925 ...command...
==10925== 
==10925== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10925==   /path/to/gdb ./zsh
==10925== and then give GDB the following command
==10925==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10925
==10925== --pid is optional if only one valgrind process is running
==10925== 
--10925-- Caught __NR_exit; running __libc_freeres()
--10925-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10925== 
==10925== HEAP SUMMARY:
==10925==     in use at exit: 3,138,613 bytes in 69,516 blocks
==10925==   total heap usage: 1,737,762 allocs, 1,668,246 frees, 140,002,599 bytes allocated
==10925== 
==10925== Searching for pointers to 69,516 not-freed blocks
--10925--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10925--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10925--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10925--   Scanning root segment: 0x4037000..0x403afff (16384)
--10925--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10925--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10925--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10925--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10925--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10925--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10925--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10925--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10925--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10925--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10925--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10925--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10925--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10925--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10925--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10925--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10925--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10925--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10925--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10925--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10925--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10925--   Scanning root segment: 0x701a000..0x701afff (4096)
--10925--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10925--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10925--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10925--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10925--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10925--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10925--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10925--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10925--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10925--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10925== Checked 4,820,768 bytes
==10925== 
==10925== LEAK SUMMARY:
==10925==    definitely lost: 3,173 bytes in 18 blocks
==10925==    indirectly lost: 6,756 bytes in 7 blocks
==10925==      possibly lost: 0 bytes in 0 blocks
==10925==    still reachable: 3,128,684 bytes in 69,491 blocks
==10925==         suppressed: 0 bytes in 0 blocks
==10925== Rerun with --leak-check=full to see details of leaked memory
==10925== 
==10925== Use --track-origins=yes to see where uninitialised values come from
==10925== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10925== 
==10925== 1 errors in context 1 of 2:
==10925== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10925==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10925==    by 0x488CD0: stringsubst (subst.c:301)
==10925==    by 0x48801B: prefork (subst.c:77)
==10925==    by 0x42B318: execcmd (exec.c:2619)
==10925==    by 0x428CA0: execpline2 (exec.c:1697)
==10925==    by 0x427FD2: execpline (exec.c:1484)
==10925==    by 0x427756: execlist (exec.c:1267)
==10925==    by 0x42717C: execode (exec.c:1073)
==10925==    by 0x431299: runshfunc (exec.c:5040)
==10925==    by 0x430E76: doshfunc (exec.c:4920)
==10925==    by 0x4302FB: execshfunc (exec.c:4557)
==10925==    by 0x42D8C1: execcmd (exec.c:3373)
==10925== 
==10925== 
==10925== 2 errors in context 2 of 2:
==10925== Conditional jump or move depends on uninitialised value(s)
==10925==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10925==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10925==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10925==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10925==    by 0x42D8E9: execcmd (exec.c:3378)
==10925==    by 0x428CA0: execpline2 (exec.c:1697)
==10925==    by 0x427FD2: execpline (exec.c:1484)
==10925==    by 0x42779A: execlist (exec.c:1275)
==10925==    by 0x42717C: execode (exec.c:1073)
==10925==    by 0x431299: runshfunc (exec.c:5040)
==10925==    by 0x430E76: doshfunc (exec.c:4920)
==10925==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10925== 
==10925== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10926== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10926-by-pythonnut-on-???
==10926== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10926-by-pythonnut-on-???
==10926== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10926-by-pythonnut-on-???
==10926== 
==10926== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10926== don't want to do, unless you know exactly what you're doing,
==10926== or are doing some strange experiment):
==10926==   /usr/lib/valgrind/../../bin/vgdb --pid=10926 ...command...
==10926== 
==10926== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10926==   /path/to/gdb ./zsh
==10926== and then give GDB the following command
==10926==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10926
==10926== --pid is optional if only one valgrind process is running
==10926== 
--10926-- Caught __NR_exit; running __libc_freeres()
--10926-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10926== 
==10926== HEAP SUMMARY:
==10926==     in use at exit: 3,138,756 bytes in 69,516 blocks
==10926==   total heap usage: 1,737,770 allocs, 1,668,254 frees, 140,005,655 bytes allocated
==10926== 
==10926== Searching for pointers to 69,516 not-freed blocks
--10926--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10926--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10926--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10926--   Scanning root segment: 0x4037000..0x403afff (16384)
--10926--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10926--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10926--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10926--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10926--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10926--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10926--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10926--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10926--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10926--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10926--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10926--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10926--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10926--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10926--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10926--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10926--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10926--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10926--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10926--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10926--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10926--   Scanning root segment: 0x701a000..0x701afff (4096)
--10926--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10926--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10926--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10926--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10926--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10926--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10926--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10926--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10926--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10926--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10926== Checked 4,822,264 bytes
==10926== 
==10926== LEAK SUMMARY:
==10926==    definitely lost: 3,173 bytes in 18 blocks
==10926==    indirectly lost: 6,756 bytes in 7 blocks
==10926==      possibly lost: 0 bytes in 0 blocks
==10926==    still reachable: 3,128,827 bytes in 69,491 blocks
==10926==         suppressed: 0 bytes in 0 blocks
==10926== Rerun with --leak-check=full to see details of leaked memory
==10926== 
==10926== Use --track-origins=yes to see where uninitialised values come from
==10926== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10926== 
==10926== 1 errors in context 1 of 2:
==10926== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10926==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10926==    by 0x488CD0: stringsubst (subst.c:301)
==10926==    by 0x48801B: prefork (subst.c:77)
==10926==    by 0x42B318: execcmd (exec.c:2619)
==10926==    by 0x428CA0: execpline2 (exec.c:1697)
==10926==    by 0x427FD2: execpline (exec.c:1484)
==10926==    by 0x427756: execlist (exec.c:1267)
==10926==    by 0x42717C: execode (exec.c:1073)
==10926==    by 0x431299: runshfunc (exec.c:5040)
==10926==    by 0x430E76: doshfunc (exec.c:4920)
==10926==    by 0x4302FB: execshfunc (exec.c:4557)
==10926==    by 0x42D8C1: execcmd (exec.c:3373)
==10926== 
==10926== 
==10926== 2 errors in context 2 of 2:
==10926== Conditional jump or move depends on uninitialised value(s)
==10926==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10926==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10926==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10926==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10926==    by 0x42D8E9: execcmd (exec.c:3378)
==10926==    by 0x428CA0: execpline2 (exec.c:1697)
==10926==    by 0x427FD2: execpline (exec.c:1484)
==10926==    by 0x42779A: execlist (exec.c:1275)
==10926==    by 0x42717C: execode (exec.c:1073)
==10926==    by 0x431299: runshfunc (exec.c:5040)
==10926==    by 0x430E76: doshfunc (exec.c:4920)
==10926==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10926== 
==10926== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10927== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10927-by-pythonnut-on-???
==10927== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10927-by-pythonnut-on-???
==10927== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10927-by-pythonnut-on-???
==10927== 
==10927== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10927== don't want to do, unless you know exactly what you're doing,
==10927== or are doing some strange experiment):
==10927==   /usr/lib/valgrind/../../bin/vgdb --pid=10927 ...command...
==10927== 
==10927== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10927==   /path/to/gdb ./zsh
==10927== and then give GDB the following command
==10927==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10927
==10927== --pid is optional if only one valgrind process is running
==10927== 
==10928== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10928-by-pythonnut-on-???
==10928== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10928-by-pythonnut-on-???
==10928== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10928-by-pythonnut-on-???
==10928== 
==10928== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10928== don't want to do, unless you know exactly what you're doing,
==10928== or are doing some strange experiment):
==10928==   /usr/lib/valgrind/../../bin/vgdb --pid=10928 ...command...
==10928== 
==10928== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10928==   /path/to/gdb ./zsh
==10928== and then give GDB the following command
==10928==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10928
==10928== --pid is optional if only one valgrind process is running
==10928== 
==10930== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10930-by-pythonnut-on-???
==10930== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10930-by-pythonnut-on-???
==10930== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10930-by-pythonnut-on-???
==10930== 
==10930== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10930== don't want to do, unless you know exactly what you're doing,
==10930== or are doing some strange experiment):
==10930==   /usr/lib/valgrind/../../bin/vgdb --pid=10930 ...command...
==10930== 
==10930== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10930==   /path/to/gdb ./zsh
==10930== and then give GDB the following command
==10930==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10930
==10930== --pid is optional if only one valgrind process is running
==10930== 
--10929-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==10929== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10929-by-pythonnut-on-???
==10931== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10931-by-pythonnut-on-???
==10929== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10929-by-pythonnut-on-???
==10931== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10931-by-pythonnut-on-???
==10929== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10929-by-pythonnut-on-???
==10931== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10931-by-pythonnut-on-???
==10929== 
==10931== 
==10929== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10929== don't want to do, unless you know exactly what you're doing,
==10929== or are doing some strange experiment):
==10929==   /usr/lib/valgrind/../../bin/vgdb --pid=10929 ...command...
==10929== 
==10931== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10931== don't want to do, unless you know exactly what you're doing,
==10931== or are doing some strange experiment):
==10931==   /usr/lib/valgrind/../../bin/vgdb --pid=10931 ...command...
==10929== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10929==   /path/to/gdb ./zsh
==10929== and then give GDB the following command
==10929==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10929
==10931== 
==10929== --pid is optional if only one valgrind process is running
==10929== 
==10931== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10931==   /path/to/gdb ./zsh
==10931== and then give GDB the following command
==10931==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10931
==10931== --pid is optional if only one valgrind process is running
==10931== 
==10932== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10932-by-pythonnut-on-???
==10932== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10932-by-pythonnut-on-???
==10932== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10932-by-pythonnut-on-???
==10932== 
==10932== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10932== don't want to do, unless you know exactly what you're doing,
==10932== or are doing some strange experiment):
==10932==   /usr/lib/valgrind/../../bin/vgdb --pid=10932 ...command...
==10932== 
==10932== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10932==   /path/to/gdb ./zsh
==10932== and then give GDB the following command
==10932==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10932
==10932== --pid is optional if only one valgrind process is running
==10932== 
--10929-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10933== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10933-by-pythonnut-on-???
==10933== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10933-by-pythonnut-on-???
==10933== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10933-by-pythonnut-on-???
==10933== 
==10933== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10933== don't want to do, unless you know exactly what you're doing,
==10933== or are doing some strange experiment):
==10933==   /usr/lib/valgrind/../../bin/vgdb --pid=10933 ...command...
==10933== 
==10933== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10933==   /path/to/gdb ./zsh
==10933== and then give GDB the following command
==10933==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10933
==10933== --pid is optional if only one valgrind process is running
==10933== 
==10929== 
==10929== HEAP SUMMARY:
==10929==     in use at exit: 3,113,529 bytes in 68,956 blocks
==10929==   total heap usage: 1,738,007 allocs, 1,669,051 frees, 140,036,781 bytes allocated
==10929== 
client request: code 4d430005,  addr 0xFFEFE66FC,  len 4
--10933-- Caught __NR_exit; running __libc_freeres()
==10929== Searching for pointers to 68,956 not-freed blocks
--10929--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10929--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10929--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10929--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10929--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10929--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10929--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10929--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10929--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10929--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10929--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10929--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10929--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10929--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10929--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10929--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10929--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10929--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10929--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10929--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10929--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10929--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10929--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10929--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10929--   Scanning root segment: 0x701a000..0x701afff (4096)
--10929--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10929--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10929--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10929--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10929--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10929--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10929--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10929--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10929--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10929--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10933-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10933== 
==10933== HEAP SUMMARY:
==10933==     in use at exit: 3,137,594 bytes in 69,547 blocks
==10933==   total heap usage: 1,599,659 allocs, 1,530,112 frees, 129,165,578 bytes allocated
==10933== 
==10933== Searching for pointers to 69,547 not-freed blocks
--10933--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10933--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10933--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10933--   Scanning root segment: 0x4037000..0x403efff (32768)
--10933--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10933--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10933--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10933--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10933--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10933--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10933--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10933--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10933--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10933--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10933--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10933--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10933--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10933--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10933--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10933--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10933--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10933--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10933--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10933--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10933--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10933--   Scanning root segment: 0x701a000..0x701afff (4096)
--10933--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10933--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10933--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10933--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10933--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10933--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10933--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10933--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10933--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10933--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10929== Checked 4,769,864 bytes
==10929== 
==10929== LEAK SUMMARY:
==10929==    definitely lost: 3,173 bytes in 18 blocks
==10929==    indirectly lost: 6,756 bytes in 7 blocks
==10929==      possibly lost: 0 bytes in 0 blocks
==10929==    still reachable: 3,103,600 bytes in 68,931 blocks
==10929==         suppressed: 0 bytes in 0 blocks
==10929== Rerun with --leak-check=full to see details of leaked memory
==10929== 
==10929== Use --track-origins=yes to see where uninitialised values come from
==10929== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10929== 
==10929== 1 errors in context 1 of 2:
==10929== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10929==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10929==    by 0x488CD0: stringsubst (subst.c:301)
==10929==    by 0x48801B: prefork (subst.c:77)
==10929==    by 0x42B318: execcmd (exec.c:2619)
==10929==    by 0x428CA0: execpline2 (exec.c:1697)
==10929==    by 0x427FD2: execpline (exec.c:1484)
==10929==    by 0x427756: execlist (exec.c:1267)
==10929==    by 0x42717C: execode (exec.c:1073)
==10929==    by 0x431299: runshfunc (exec.c:5040)
==10929==    by 0x430E76: doshfunc (exec.c:4920)
==10929==    by 0x4302FB: execshfunc (exec.c:4557)
==10929==    by 0x42D8C1: execcmd (exec.c:3373)
==10929== 
==10929== 
==10929== 2 errors in context 2 of 2:
==10929== Conditional jump or move depends on uninitialised value(s)
==10929==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10929==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10933== Checked 4,841,504 bytes
==10929==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10933== 
==10929==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10929==    by 0x42D8E9: execcmd (exec.c:3378)
==10929==    by 0x428CA0: execpline2 (exec.c:1697)
==10929==    by 0x427FD2: execpline (exec.c:1484)
==10929==    by 0x42779A: execlist (exec.c:1275)
==10929==    by 0x42717C: execode (exec.c:1073)
==10929==    by 0x431299: runshfunc (exec.c:5040)
==10929==    by 0x430E76: doshfunc (exec.c:4920)
==10929==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10929== 
==10929== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10927-- Caught __NR_exit; running __libc_freeres()
==10933== LEAK SUMMARY:
==10933==    definitely lost: 2,221 bytes in 14 blocks
==10933==    indirectly lost: 6,796 bytes in 9 blocks
==10933==      possibly lost: 0 bytes in 0 blocks
==10933==    still reachable: 3,128,577 bytes in 69,524 blocks
==10933==         suppressed: 0 bytes in 0 blocks
==10933== Rerun with --leak-check=full to see details of leaked memory
==10933== 
==10933== Use --track-origins=yes to see where uninitialised values come from
==10933== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10933== 
==10933== 1 errors in context 1 of 2:
==10933== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10933==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10933==    by 0x488CD0: stringsubst (subst.c:301)
==10933==    by 0x48801B: prefork (subst.c:77)
==10933==    by 0x42B318: execcmd (exec.c:2619)
==10933==    by 0x428CA0: execpline2 (exec.c:1697)
==10933==    by 0x427FD2: execpline (exec.c:1484)
==10933==    by 0x427756: execlist (exec.c:1267)
==10933==    by 0x42717C: execode (exec.c:1073)
==10933==    by 0x431299: runshfunc (exec.c:5040)
==10933==    by 0x430E76: doshfunc (exec.c:4920)
==10933==    by 0x4302FB: execshfunc (exec.c:4557)
==10933==    by 0x42D8C1: execcmd (exec.c:3373)
==10933== 
==10933== 
==10933== 2 errors in context 2 of 2:
==10933== Conditional jump or move depends on uninitialised value(s)
==10933==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10933==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10933==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10933==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10933==    by 0x42D8E9: execcmd (exec.c:3378)
==10933==    by 0x428CA0: execpline2 (exec.c:1697)
==10933==    by 0x427FD2: execpline (exec.c:1484)
==10933==    by 0x42779A: execlist (exec.c:1275)
==10933==    by 0x42717C: execode (exec.c:1073)
==10933==    by 0x431299: runshfunc (exec.c:5040)
==10933==    by 0x430E76: doshfunc (exec.c:4920)
==10933==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10933== 
==10933== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10927-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10927== 
==10927== HEAP SUMMARY:
==10927==     in use at exit: 3,113,138 bytes in 68,946 blocks
==10927==   total heap usage: 1,738,009 allocs, 1,669,063 frees, 140,037,325 bytes allocated
==10927== 
client request: code 4d430005,  addr 0xFFEFE6BAC,  len 4
==10927== Searching for pointers to 68,946 not-freed blocks
--10927--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10927--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10927--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10927--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10927--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10927--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10927--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10927--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10927--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10927--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10927--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10927--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10927--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10927--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10927--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10927--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10927--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10927--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10927--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10927--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10927--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10927--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10927--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10927--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10927--   Scanning root segment: 0x701a000..0x701afff (4096)
--10927--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10927--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10927--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10927--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10927--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10927--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10927--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10927--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10927--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10927--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10927== Checked 4,767,520 bytes
==10927== 
--10935-- Caught __NR_exit; running __libc_freeres()
==10927== LEAK SUMMARY:
==10927==    definitely lost: 3,173 bytes in 18 blocks
==10927==    indirectly lost: 6,756 bytes in 7 blocks
==10927==      possibly lost: 0 bytes in 0 blocks
==10927==    still reachable: 3,103,209 bytes in 68,921 blocks
==10927==         suppressed: 0 bytes in 0 blocks
==10927== Rerun with --leak-check=full to see details of leaked memory
==10927== 
==10927== Use --track-origins=yes to see where uninitialised values come from
==10927== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10927== 
==10927== 1 errors in context 1 of 2:
==10927== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10927==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10927==    by 0x488CD0: stringsubst (subst.c:301)
==10927==    by 0x48801B: prefork (subst.c:77)
==10927==    by 0x42B318: execcmd (exec.c:2619)
==10927==    by 0x428CA0: execpline2 (exec.c:1697)
==10927==    by 0x427FD2: execpline (exec.c:1484)
==10927==    by 0x427756: execlist (exec.c:1267)
==10927==    by 0x42717C: execode (exec.c:1073)
==10927==    by 0x431299: runshfunc (exec.c:5040)
==10927==    by 0x430E76: doshfunc (exec.c:4920)
==10927==    by 0x4302FB: execshfunc (exec.c:4557)
==10927==    by 0x42D8C1: execcmd (exec.c:3373)
==10927== 
==10927== 
==10927== 2 errors in context 2 of 2:
==10927== Conditional jump or move depends on uninitialised value(s)
==10927==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10927==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10927==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10927==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10927==    by 0x42D8E9: execcmd (exec.c:3378)
==10927==    by 0x428CA0: execpline2 (exec.c:1697)
==10927==    by 0x427FD2: execpline (exec.c:1484)
==10927==    by 0x42779A: execlist (exec.c:1275)
==10927==    by 0x42717C: execode (exec.c:1073)
==10927==    by 0x431299: runshfunc (exec.c:5040)
==10927==    by 0x430E76: doshfunc (exec.c:4920)
==10927==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10927== 
==10927== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10935== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10935-by-pythonnut-on-???
==10935== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10935-by-pythonnut-on-???
==10935== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10935-by-pythonnut-on-???
==10935== 
==10935== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10935== don't want to do, unless you know exactly what you're doing,
==10935== or are doing some strange experiment):
==10935==   /usr/lib/valgrind/../../bin/vgdb --pid=10935 ...command...
==10935== 
==10935== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10935==   /path/to/gdb ./zsh
==10935== and then give GDB the following command
==10935==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10935
==10935== --pid is optional if only one valgrind process is running
==10935== 
--10935-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10935== 
==10935== HEAP SUMMARY:
==10935==     in use at exit: 3,137,839 bytes in 69,552 blocks
==10935==   total heap usage: 1,599,671 allocs, 1,530,119 frees, 129,169,479 bytes allocated
==10935== 
--10984-- Caught __NR_exit; running __libc_freeres()
==10984== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10984-by-pythonnut-on-???
==10985== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10985-by-pythonnut-on-???
==10984== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10984-by-pythonnut-on-???
==10985== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10985-by-pythonnut-on-???
==10984== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10984-by-pythonnut-on-???
==10985== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10985-by-pythonnut-on-???
==10984== 
==10985== 
==10984== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10984== don't want to do, unless you know exactly what you're doing,
==10984== or are doing some strange experiment):
==10984==   /usr/lib/valgrind/../../bin/vgdb --pid=10984 ...command...
==10985== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10985== don't want to do, unless you know exactly what you're doing,
==10985== or are doing some strange experiment):
==10985==   /usr/lib/valgrind/../../bin/vgdb --pid=10985 ...command...
==10984== 
==10985== 
==10984== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10984==   /path/to/gdb ./zsh
==10984== and then give GDB the following command
==10984==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10984
==10985== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10985==   /path/to/gdb ./zsh
==10985== and then give GDB the following command
==10985==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10985
==10984== --pid is optional if only one valgrind process is running
==10985== --pid is optional if only one valgrind process is running
==10984== 
==10985== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
==10988== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10988-by-pythonnut-on-???
==10988== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10988-by-pythonnut-on-???
==10988== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10988-by-pythonnut-on-???
==10988== 
==10988== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10988== don't want to do, unless you know exactly what you're doing,
==10988== or are doing some strange experiment):
==10988==   /usr/lib/valgrind/../../bin/vgdb --pid=10988 ...command...
==10988== 
==10988== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10988==   /path/to/gdb ./zsh
==10988== and then give GDB the following command
==10988==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10988
==10988== --pid is optional if only one valgrind process is running
==10988== 
--10984-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10935== Searching for pointers to 69,552 not-freed blocks
--10935--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
--10935--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10935--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10935--   Scanning root segment: 0x4037000..0x403efff (32768)
--10935--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10935--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10935--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10935--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10935--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10935--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10935--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10935--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10935--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10935--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10935--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10935--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10935--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10935--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10935--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10935--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10935--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10935--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10935--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10935--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10935--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10935--   Scanning root segment: 0x701a000..0x701afff (4096)
--10935--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10935--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10935--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10935--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10935--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10935--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10935--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10935--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10935--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10935--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10984== 
==10984== HEAP SUMMARY:
==10984==     in use at exit: 3,113,614 bytes in 68,957 blocks
==10984==   total heap usage: 1,738,040 allocs, 1,669,083 frees, 140,049,905 bytes allocated
==10984== 
==10983== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10983-by-pythonnut-on-???
==10983== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10983-by-pythonnut-on-???
==10983== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10983-by-pythonnut-on-???
==10983== 
==10983== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10983== don't want to do, unless you know exactly what you're doing,
==10983== or are doing some strange experiment):
==10983==   /usr/lib/valgrind/../../bin/vgdb --pid=10983 ...command...
==10983== 
==10983== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10983==   /path/to/gdb ./zsh
==10983== and then give GDB the following command
==10983==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10983
==10983== --pid is optional if only one valgrind process is running
==10983== 
==10984== Searching for pointers to 68,957 not-freed blocks
--10984--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10984--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10984--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10984--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10984--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10984--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10984--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10984--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10984--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10984--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10984--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10984--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10984--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10984--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10984--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10984--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10984--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10984--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10984--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10984--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10984--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10984--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10984--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10984--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10984--   Scanning root segment: 0x701a000..0x701afff (4096)
--10984--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10984--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10984--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10984--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10984--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10984--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10984--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10984--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10984--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10984--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10935== Checked 4,841,472 bytes
==10935== 
==10935== LEAK SUMMARY:
==10935==    definitely lost: 2,221 bytes in 14 blocks
==10935==    indirectly lost: 6,796 bytes in 9 blocks
==10935==      possibly lost: 0 bytes in 0 blocks
==10935==    still reachable: 3,128,822 bytes in 69,529 blocks
==10935==         suppressed: 0 bytes in 0 blocks
==10935== Rerun with --leak-check=full to see details of leaked memory
==10935== 
==10935== Use --track-origins=yes to see where uninitialised values come from
==10935== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10935== 
==10935== 1 errors in context 1 of 2:
==10935== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10935==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10935==    by 0x488CD0: stringsubst (subst.c:301)
==10935==    by 0x48801B: prefork (subst.c:77)
==10935==    by 0x42B318: execcmd (exec.c:2619)
==10935==    by 0x428CA0: execpline2 (exec.c:1697)
==10935==    by 0x427FD2: execpline (exec.c:1484)
==10935==    by 0x427756: execlist (exec.c:1267)
==10935==    by 0x42717C: execode (exec.c:1073)
==10935==    by 0x431299: runshfunc (exec.c:5040)
==10935==    by 0x430E76: doshfunc (exec.c:4920)
==10935==    by 0x4302FB: execshfunc (exec.c:4557)
==10935==    by 0x42D8C1: execcmd (exec.c:3373)
==10935== 
==10935== 
==10935== 2 errors in context 2 of 2:
==10935== Conditional jump or move depends on uninitialised value(s)
==10935==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10935==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10935==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10935==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10935==    by 0x42D8E9: execcmd (exec.c:3378)
==10935==    by 0x428CA0: execpline2 (exec.c:1697)
==10935==    by 0x427FD2: execpline (exec.c:1484)
==10935==    by 0x42779A: execlist (exec.c:1275)
==10935==    by 0x42717C: execode (exec.c:1073)
==10935==    by 0x431299: runshfunc (exec.c:5040)
==10935==    by 0x430E76: doshfunc (exec.c:4920)
==10935==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10935== 
==10935== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10984== Checked 4,770,648 bytes
==10984== 
--10932-- Caught __NR_exit; running __libc_freeres()
==10984== LEAK SUMMARY:
==10984==    definitely lost: 3,173 bytes in 18 blocks
==10984==    indirectly lost: 6,756 bytes in 7 blocks
==10984==      possibly lost: 0 bytes in 0 blocks
==10984==    still reachable: 3,103,685 bytes in 68,932 blocks
==10984==         suppressed: 0 bytes in 0 blocks
==10984== Rerun with --leak-check=full to see details of leaked memory
==10984== 
==10984== Use --track-origins=yes to see where uninitialised values come from
==10984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10984== 
==10984== 1 errors in context 1 of 2:
==10984== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10984==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10984==    by 0x488CD0: stringsubst (subst.c:301)
==10984==    by 0x48801B: prefork (subst.c:77)
==10984==    by 0x42B318: execcmd (exec.c:2619)
==10984==    by 0x428CA0: execpline2 (exec.c:1697)
==10984==    by 0x427FD2: execpline (exec.c:1484)
==10984==    by 0x427756: execlist (exec.c:1267)
==10984==    by 0x42717C: execode (exec.c:1073)
==10984==    by 0x431299: runshfunc (exec.c:5040)
==10984==    by 0x430E76: doshfunc (exec.c:4920)
==10984==    by 0x4302FB: execshfunc (exec.c:4557)
==10984==    by 0x42D8C1: execcmd (exec.c:3373)
==10984== 
==10984== 
==10984== 2 errors in context 2 of 2:
==10984== Conditional jump or move depends on uninitialised value(s)
==10984==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10984==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10984==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10984==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10984==    by 0x42D8E9: execcmd (exec.c:3378)
==10984==    by 0x428CA0: execpline2 (exec.c:1697)
==10984==    by 0x427FD2: execpline (exec.c:1484)
==10984==    by 0x42779A: execlist (exec.c:1275)
==10984==    by 0x42717C: execode (exec.c:1073)
==10984==    by 0x431299: runshfunc (exec.c:5040)
==10984==    by 0x430E76: doshfunc (exec.c:4920)
==10984==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10984== 
==10984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10983-- Caught __NR_exit; running __libc_freeres()
--10932-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10932== 
==10932== HEAP SUMMARY:
==10932==     in use at exit: 3,135,675 bytes in 69,477 blocks
==10932==   total heap usage: 1,599,622 allocs, 1,530,145 frees, 129,170,090 bytes allocated
==10932== 
--10983-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10983== 
==10983== HEAP SUMMARY:
==10983==     in use at exit: 3,113,550 bytes in 68,957 blocks
==10983==   total heap usage: 1,738,044 allocs, 1,669,087 frees, 140,049,441 bytes allocated
==10983== 
==10932== Searching for pointers to 69,477 not-freed blocks
--10932--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10932--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10932--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10932--   Scanning root segment: 0x4037000..0x403afff (16384)
--10932--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10932--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10932--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10932--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10932--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10932--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10932--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10932--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10932--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10932--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10932--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10932--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10932--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10932--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10932--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10932--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10932--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10932--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10932--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10932--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10932--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10932--   Scanning root segment: 0x701a000..0x701afff (4096)
--10932--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10932--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10932--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10932--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10932--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10932--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10932--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10932--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10932--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10932--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10983== Searching for pointers to 68,957 not-freed blocks
--10983--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10983--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10983--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10983--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10983--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10983--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10983--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10983--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10983--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10983--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10983--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10983--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10983--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10983--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10983--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10983--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10983--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10983--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10983--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10983--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10983--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10983--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10983--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10983--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10983--   Scanning root segment: 0x701a000..0x701afff (4096)
--10983--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10983--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10983--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10983--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10983--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10983--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10983--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10983--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10983--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10983--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10932== Checked 4,821,400 bytes
==10932== 
==10983== Checked 4,770,280 bytes
==10983== 
==10932== LEAK SUMMARY:
==10932==    definitely lost: 2,221 bytes in 14 blocks
==10932==    indirectly lost: 6,796 bytes in 9 blocks
==10932==      possibly lost: 0 bytes in 0 blocks
==10932==    still reachable: 3,126,658 bytes in 69,454 blocks
==10932==         suppressed: 0 bytes in 0 blocks
==10932== Rerun with --leak-check=full to see details of leaked memory
==10932== 
==10932== Use --track-origins=yes to see where uninitialised values come from
==10932== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10932== 
==10932== 1 errors in context 1 of 2:
==10932== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10932==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10932==    by 0x488CD0: stringsubst (subst.c:301)
==10932==    by 0x48801B: prefork (subst.c:77)
==10932==    by 0x42B318: execcmd (exec.c:2619)
==10932==    by 0x428CA0: execpline2 (exec.c:1697)
==10932==    by 0x427FD2: execpline (exec.c:1484)
==10932==    by 0x427756: execlist (exec.c:1267)
==10932==    by 0x42717C: execode (exec.c:1073)
==10932==    by 0x431299: runshfunc (exec.c:5040)
==10932==    by 0x430E76: doshfunc (exec.c:4920)
==10932==    by 0x4302FB: execshfunc (exec.c:4557)
==10932==    by 0x42D8C1: execcmd (exec.c:3373)
==10932== 
==10932== 
==10932== 2 errors in context 2 of 2:
==10932== Conditional jump or move depends on uninitialised value(s)
==10932==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10932==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10932==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10932==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10932==    by 0x42D8E9: execcmd (exec.c:3378)
==10932==    by 0x428CA0: execpline2 (exec.c:1697)
==10932==    by 0x427FD2: execpline (exec.c:1484)
==10932==    by 0x42779A: execlist (exec.c:1275)
==10932==    by 0x42717C: execode (exec.c:1073)
==10932==    by 0x431299: runshfunc (exec.c:5040)
==10932==    by 0x430E76: doshfunc (exec.c:4920)
==10932==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10932== 
==10932== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10983== LEAK SUMMARY:
==10983==    definitely lost: 3,173 bytes in 18 blocks
==10983==    indirectly lost: 6,756 bytes in 7 blocks
==10983==      possibly lost: 0 bytes in 0 blocks
==10983==    still reachable: 3,103,621 bytes in 68,932 blocks
==10983==         suppressed: 0 bytes in 0 blocks
==10983== Rerun with --leak-check=full to see details of leaked memory
==10983== 
==10983== Use --track-origins=yes to see where uninitialised values come from
==10983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10983== 
==10983== 1 errors in context 1 of 2:
==10983== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10983==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10983==    by 0x488CD0: stringsubst (subst.c:301)
==10983==    by 0x48801B: prefork (subst.c:77)
==10983==    by 0x42B318: execcmd (exec.c:2619)
==10983==    by 0x428CA0: execpline2 (exec.c:1697)
==10983==    by 0x427FD2: execpline (exec.c:1484)
==10983==    by 0x427756: execlist (exec.c:1267)
==10983==    by 0x42717C: execode (exec.c:1073)
==10983==    by 0x431299: runshfunc (exec.c:5040)
==10983==    by 0x430E76: doshfunc (exec.c:4920)
==10983==    by 0x4302FB: execshfunc (exec.c:4557)
==10983==    by 0x42D8C1: execcmd (exec.c:3373)
==10983== 
==10983== 
==10983== 2 errors in context 2 of 2:
==10983== Conditional jump or move depends on uninitialised value(s)
==10983==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10983==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10983==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10983==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10983==    by 0x42D8E9: execcmd (exec.c:3378)
==10983==    by 0x428CA0: execpline2 (exec.c:1697)
==10983==    by 0x427FD2: execpline (exec.c:1484)
==10983==    by 0x42779A: execlist (exec.c:1275)
==10983==    by 0x42717C: execode (exec.c:1073)
==10983==    by 0x431299: runshfunc (exec.c:5040)
==10983==    by 0x430E76: doshfunc (exec.c:4920)
==10983==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10983== 
==10983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10991== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10991-by-pythonnut-on-???
==10991== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10991-by-pythonnut-on-???
==10991== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10991-by-pythonnut-on-???
==10991== 
==10991== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10991== don't want to do, unless you know exactly what you're doing,
==10991== or are doing some strange experiment):
==10991==   /usr/lib/valgrind/../../bin/vgdb --pid=10991 ...command...
==10991== 
==10991== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10991==   /path/to/gdb ./zsh
==10991== and then give GDB the following command
==10991==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10991
==10991== --pid is optional if only one valgrind process is running
==10991== 
--10991-- Caught __NR_exit; running __libc_freeres()
==10992== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10992-by-pythonnut-on-???
==10992== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10992-by-pythonnut-on-???
==10992== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10992-by-pythonnut-on-???
==10992== 
==10992== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10992== don't want to do, unless you know exactly what you're doing,
==10992== or are doing some strange experiment):
==10992==   /usr/lib/valgrind/../../bin/vgdb --pid=10992 ...command...
==10992== 
==10992== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10992==   /path/to/gdb ./zsh
==10992== and then give GDB the following command
==10992==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10992
==10992== --pid is optional if only one valgrind process is running
==10992== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--10990-- Caught __NR_exit; running __libc_freeres()
--10991-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10991== 
==10990== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10990-by-pythonnut-on-???
==10990== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10990-by-pythonnut-on-???
==10990== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10990-by-pythonnut-on-???
==10990== 
==10990== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10990== don't want to do, unless you know exactly what you're doing,
==10990== or are doing some strange experiment):
==10990==   /usr/lib/valgrind/../../bin/vgdb --pid=10990 ...command...
==10990== 
==10990== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10990==   /path/to/gdb ./zsh
==10990== and then give GDB the following command
==10990==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10990
==10990== --pid is optional if only one valgrind process is running
==10990== 
==10991== HEAP SUMMARY:
==10991==     in use at exit: 3,137,448 bytes in 69,539 blocks
==10991==   total heap usage: 1,599,691 allocs, 1,530,152 frees, 129,178,853 bytes allocated
==10991== 
--10990-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10990== 
==10990== HEAP SUMMARY:
==10990==     in use at exit: 3,113,813 bytes in 68,962 blocks
==10990==   total heap usage: 1,738,055 allocs, 1,669,093 frees, 140,054,529 bytes allocated
==10990== 
==10991== Searching for pointers to 69,539 not-freed blocks
--10991--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10991--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10991--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10991--   Scanning root segment: 0x4037000..0x403efff (32768)
--10991--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10991--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10991--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10991--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10991--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10991--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10991--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10991--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10991--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10991--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10991--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10991--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10991--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10991--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10991--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10991--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10991--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10991--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10991--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10991--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10991--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10991--   Scanning root segment: 0x701a000..0x701afff (4096)
--10991--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10991--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10991--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10991--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10991--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10991--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10991--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10991--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10991--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10991--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10990== Searching for pointers to 68,962 not-freed blocks
--10990--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10990--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10990--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10990--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10990--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10990--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10990--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10990--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10990--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10990--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10990--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10990--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10990--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10990--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10990--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10990--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10990--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10990--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10990--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10990--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10990--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10990--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10990--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10990--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10990--   Scanning root segment: 0x701a000..0x701afff (4096)
--10990--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10990--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10990--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10990--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10990--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10990--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10990--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10990--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10990--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10990--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10991== Checked 4,840,040 bytes
==10991== 
==10991== LEAK SUMMARY:
==10991==    definitely lost: 2,221 bytes in 14 blocks
==10991==    indirectly lost: 6,796 bytes in 9 blocks
==10991==      possibly lost: 0 bytes in 0 blocks
==10991==    still reachable: 3,128,431 bytes in 69,516 blocks
==10991==         suppressed: 0 bytes in 0 blocks
==10991== Rerun with --leak-check=full to see details of leaked memory
==10991== 
==10991== Use --track-origins=yes to see where uninitialised values come from
==10991== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10991== 
==10991== 1 errors in context 1 of 2:
==10991== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10991==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10991==    by 0x488CD0: stringsubst (subst.c:301)
==10991==    by 0x48801B: prefork (subst.c:77)
==10991==    by 0x42B318: execcmd (exec.c:2619)
==10991==    by 0x428CA0: execpline2 (exec.c:1697)
==10991==    by 0x427FD2: execpline (exec.c:1484)
==10991==    by 0x427756: execlist (exec.c:1267)
==10991==    by 0x42717C: execode (exec.c:1073)
==10991==    by 0x431299: runshfunc (exec.c:5040)
==10991==    by 0x430E76: doshfunc (exec.c:4920)
==10991==    by 0x4302FB: execshfunc (exec.c:4557)
==10991==    by 0x42D8C1: execcmd (exec.c:3373)
==10991== 
==10991== 
==10991== 2 errors in context 2 of 2:
==10991== Conditional jump or move depends on uninitialised value(s)
==10991==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10991==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10991==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10991==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10991==    by 0x42D8E9: execcmd (exec.c:3378)
==10991==    by 0x428CA0: execpline2 (exec.c:1697)
==10991==    by 0x427FD2: execpline (exec.c:1484)
==10991==    by 0x42779A: execlist (exec.c:1275)
==10991==    by 0x42717C: execode (exec.c:1073)
==10991==    by 0x431299: runshfunc (exec.c:5040)
==10991==    by 0x430E76: doshfunc (exec.c:4920)
==10991==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10991== 
==10991== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10989-by-pythonnut-on-???
==10989== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10989-by-pythonnut-on-???
==10989== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10989-by-pythonnut-on-???
==10989== 
==10989== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10989== don't want to do, unless you know exactly what you're doing,
==10989== or are doing some strange experiment):
==10989==   /usr/lib/valgrind/../../bin/vgdb --pid=10989 ...command...
==10989== 
==10989== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10989==   /path/to/gdb ./zsh
==10989== and then give GDB the following command
==10989==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10989
==10989== --pid is optional if only one valgrind process is running
==10989== 
--10989-- Caught __NR_exit; running __libc_freeres()
==10990== Checked 4,770,264 bytes
==10990== 
--10989-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10990== LEAK SUMMARY:
==10990==    definitely lost: 3,173 bytes in 18 blocks
==10990==    indirectly lost: 6,756 bytes in 7 blocks
==10990==      possibly lost: 0 bytes in 0 blocks
==10990==    still reachable: 3,103,884 bytes in 68,937 blocks
==10990==         suppressed: 0 bytes in 0 blocks
==10990== Rerun with --leak-check=full to see details of leaked memory
==10990== 
==10990== Use --track-origins=yes to see where uninitialised values come from
==10990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10990== 
==10990== 1 errors in context 1 of 2:
==10990== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10990==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10990==    by 0x488CD0: stringsubst (subst.c:301)
==10990==    by 0x48801B: prefork (subst.c:77)
==10990==    by 0x42B318: execcmd (exec.c:2619)
==10990==    by 0x428CA0: execpline2 (exec.c:1697)
==10990==    by 0x427FD2: execpline (exec.c:1484)
==10990==    by 0x427756: execlist (exec.c:1267)
==10990==    by 0x42717C: execode (exec.c:1073)
==10990==    by 0x431299: runshfunc (exec.c:5040)
==10990==    by 0x430E76: doshfunc (exec.c:4920)
==10990==    by 0x4302FB: execshfunc (exec.c:4557)
==10990==    by 0x42D8C1: execcmd (exec.c:3373)
==10990== 
==10990== 
==10990== 2 errors in context 2 of 2:
==10990== Conditional jump or move depends on uninitialised value(s)
==10990==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10990==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10990==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10990==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10990==    by 0x42D8E9: execcmd (exec.c:3378)
==10990==    by 0x428CA0: execpline2 (exec.c:1697)
==10990==    by 0x427FD2: execpline (exec.c:1484)
==10990==    by 0x42779A: execlist (exec.c:1275)
==10990==    by 0x42717C: execode (exec.c:1073)
==10990==    by 0x431299: runshfunc (exec.c:5040)
==10990==    by 0x430E76: doshfunc (exec.c:4920)
==10990==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10990== 
==10990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== 
==10989== HEAP SUMMARY:
==10989==     in use at exit: 3,137,384 bytes in 69,536 blocks
==10989==   total heap usage: 1,599,693 allocs, 1,530,157 frees, 129,179,397 bytes allocated
==10989== 
==10989== Searching for pointers to 69,536 not-freed blocks
--10989--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10989--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10989--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10989--   Scanning root segment: 0x4037000..0x403efff (32768)
--10989--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10989--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10989--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10989--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10989--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10989--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10989--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10989--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10989--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10989--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10989--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10989--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10989--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10989--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10989--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10989--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10989--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10989--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10989--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10989--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10989--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10989--   Scanning root segment: 0x701a000..0x701afff (4096)
--10989--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10989--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10989--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10989--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10989--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10989--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10989--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10989--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10989--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10989--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
==10995== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10995-by-pythonnut-on-???
==10995== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10995-by-pythonnut-on-???
==10995== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10995-by-pythonnut-on-???
==10995== 
==10995== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10995== don't want to do, unless you know exactly what you're doing,
==10995== or are doing some strange experiment):
==10995==   /usr/lib/valgrind/../../bin/vgdb --pid=10995 ...command...
==10995== 
==10995== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10995==   /path/to/gdb ./zsh
==10995== and then give GDB the following command
==10995==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10995
==10995== --pid is optional if only one valgrind process is running
==10995== 
--10994-- Caught __NR_exit; running __libc_freeres()
==10994== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10994-by-pythonnut-on-???
==10994== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10994-by-pythonnut-on-???
==10994== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10994-by-pythonnut-on-???
==10994== 
==10994== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10994== don't want to do, unless you know exactly what you're doing,
==10994== or are doing some strange experiment):
==10994==   /usr/lib/valgrind/../../bin/vgdb --pid=10994 ...command...
==10994== 
==10994== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10994==   /path/to/gdb ./zsh
==10994== and then give GDB the following command
==10994==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10994
==10994== --pid is optional if only one valgrind process is running
==10994== 
--10994-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10994== 
==10994== HEAP SUMMARY:
==10994==     in use at exit: 3,113,920 bytes in 68,966 blocks
==10994==   total heap usage: 1,738,063 allocs, 1,669,097 frees, 140,056,748 bytes allocated
==10994== 
==10994== Searching for pointers to 68,966 not-freed blocks
--10994--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10994--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10994--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10994--   Scanning root segment: 0x4037000..0x403afff (16384)
--10994--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10994--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10994--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10994--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10994--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10994--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10994--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10994--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10994--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10994--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10994--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10994--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10994--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10994--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10994--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10994--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10994--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10994--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10994--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10994--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10994--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10994--   Scanning root segment: 0x701a000..0x701afff (4096)
--10994--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10994--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10994--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10994--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10994--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10994--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10994--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10994--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10994--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10994--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10989== Checked 4,839,352 bytes
==10989== 
==10989== LEAK SUMMARY:
==10989==    definitely lost: 2,221 bytes in 14 blocks
==10989==    indirectly lost: 6,796 bytes in 9 blocks
==10989==      possibly lost: 0 bytes in 0 blocks
==10989==    still reachable: 3,128,367 bytes in 69,513 blocks
==10989==         suppressed: 0 bytes in 0 blocks
==10989== Rerun with --leak-check=full to see details of leaked memory
==10989== 
==10989== Use --track-origins=yes to see where uninitialised values come from
==10989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== 
==10989== 1 errors in context 1 of 2:
==10989== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10989==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10989==    by 0x488CD0: stringsubst (subst.c:301)
==10989==    by 0x48801B: prefork (subst.c:77)
==10989==    by 0x42B318: execcmd (exec.c:2619)
==10989==    by 0x428CA0: execpline2 (exec.c:1697)
==10989==    by 0x427FD2: execpline (exec.c:1484)
==10989==    by 0x427756: execlist (exec.c:1267)
==10989==    by 0x42717C: execode (exec.c:1073)
==10989==    by 0x431299: runshfunc (exec.c:5040)
==10989==    by 0x430E76: doshfunc (exec.c:4920)
==10989==    by 0x4302FB: execshfunc (exec.c:4557)
==10989==    by 0x42D8C1: execcmd (exec.c:3373)
==10989== 
==10989== 
==10989== 2 errors in context 2 of 2:
==10989== Conditional jump or move depends on uninitialised value(s)
==10989==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10989==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10989==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10989==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10989==    by 0x42D8E9: execcmd (exec.c:3378)
==10989==    by 0x428CA0: execpline2 (exec.c:1697)
==10989==    by 0x427FD2: execpline (exec.c:1484)
==10989==    by 0x42779A: execlist (exec.c:1275)
==10989==    by 0x42717C: execode (exec.c:1073)
==10989==    by 0x431299: runshfunc (exec.c:5040)
==10989==    by 0x430E76: doshfunc (exec.c:4920)
==10989==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10989== 
==10989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10996-by-pythonnut-on-???
==10996== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10996-by-pythonnut-on-???
==10996== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10996-by-pythonnut-on-???
==10996== 
==10996== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10996== don't want to do, unless you know exactly what you're doing,
==10996== or are doing some strange experiment):
==10996==   /usr/lib/valgrind/../../bin/vgdb --pid=10996 ...command...
==10996== 
==10996== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10996==   /path/to/gdb ./zsh
==10996== and then give GDB the following command
==10996==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10996
==10996== --pid is optional if only one valgrind process is running
==10996== 
--10996-- Caught __NR_exit; running __libc_freeres()
--10996-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10996== 
==10996== HEAP SUMMARY:
==10996==     in use at exit: 3,137,388 bytes in 69,536 blocks
==10996==   total heap usage: 1,599,710 allocs, 1,530,174 frees, 129,184,417 bytes allocated
==10996== 
==10994== Checked 4,787,016 bytes
==10994== 
==10994== LEAK SUMMARY:
==10994==    definitely lost: 3,173 bytes in 18 blocks
==10994==    indirectly lost: 6,756 bytes in 7 blocks
==10994==      possibly lost: 0 bytes in 0 blocks
==10994==    still reachable: 3,103,991 bytes in 68,941 blocks
==10994==         suppressed: 0 bytes in 0 blocks
==10994== Rerun with --leak-check=full to see details of leaked memory
==10994== 
==10994== Use --track-origins=yes to see where uninitialised values come from
==10994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10994== 
==10994== 1 errors in context 1 of 2:
==10994== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10994==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10994==    by 0x488CD0: stringsubst (subst.c:301)
==10994==    by 0x48801B: prefork (subst.c:77)
==10994==    by 0x42B318: execcmd (exec.c:2619)
==10994==    by 0x428CA0: execpline2 (exec.c:1697)
==10994==    by 0x427FD2: execpline (exec.c:1484)
==10994==    by 0x427756: execlist (exec.c:1267)
==10994==    by 0x42717C: execode (exec.c:1073)
==10994==    by 0x431299: runshfunc (exec.c:5040)
==10994==    by 0x430E76: doshfunc (exec.c:4920)
==10994==    by 0x4302FB: execshfunc (exec.c:4557)
==10994==    by 0x42D8C1: execcmd (exec.c:3373)
==10994== 
==10994== 
==10994== 2 errors in context 2 of 2:
==10994== Conditional jump or move depends on uninitialised value(s)
==10994==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10994==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10994==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10994==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10994==    by 0x42D8E9: execcmd (exec.c:3378)
==10994==    by 0x428CA0: execpline2 (exec.c:1697)
==10994==    by 0x427FD2: execpline (exec.c:1484)
==10994==    by 0x42779A: execlist (exec.c:1275)
==10994==    by 0x42717C: execode (exec.c:1073)
==10994==    by 0x431299: runshfunc (exec.c:5040)
==10994==    by 0x430E76: doshfunc (exec.c:4920)
==10994==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10994== 
==10994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== Searching for pointers to 69,536 not-freed blocks
--10996--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10996--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10996--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10996--   Scanning root segment: 0x4037000..0x403efff (32768)
--10996--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10996--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10996--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10996--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10996--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10996--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10996--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10996--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10996--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10996--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10996--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10996--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10996--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10996--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10996--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10996--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10996--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10996--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10996--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10996--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10996--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10996--   Scanning root segment: 0x701a000..0x701afff (4096)
--10996--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10996--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10996--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10996--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10996--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10996--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10996--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10996--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10996--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10996--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--10999-- Caught __NR_exit; running __libc_freeres()
==10996== Checked 4,839,360 bytes
==10996== 
==10999== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10999-by-pythonnut-on-???
==10999== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10999-by-pythonnut-on-???
==10999== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10999-by-pythonnut-on-???
==10999== 
==10999== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10999== don't want to do, unless you know exactly what you're doing,
==10999== or are doing some strange experiment):
==10999==   /usr/lib/valgrind/../../bin/vgdb --pid=10999 ...command...
==10999== 
==10999== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10999==   /path/to/gdb ./zsh
==10999== and then give GDB the following command
==10999==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10999
==10999== --pid is optional if only one valgrind process is running
==10999== 
--10999-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10996== LEAK SUMMARY:
==10996==    definitely lost: 2,221 bytes in 14 blocks
==10996==    indirectly lost: 6,796 bytes in 9 blocks
==10996==      possibly lost: 0 bytes in 0 blocks
==10996==    still reachable: 3,128,371 bytes in 69,513 blocks
==10996==         suppressed: 0 bytes in 0 blocks
==10996== Rerun with --leak-check=full to see details of leaked memory
==10996== 
==10996== Use --track-origins=yes to see where uninitialised values come from
==10996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== 
==10996== 1 errors in context 1 of 2:
==10996== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10996==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10996==    by 0x488CD0: stringsubst (subst.c:301)
==10996==    by 0x48801B: prefork (subst.c:77)
==10996==    by 0x42B318: execcmd (exec.c:2619)
==10996==    by 0x428CA0: execpline2 (exec.c:1697)
==10996==    by 0x427FD2: execpline (exec.c:1484)
==10996==    by 0x427756: execlist (exec.c:1267)
==10996==    by 0x42717C: execode (exec.c:1073)
==10996==    by 0x431299: runshfunc (exec.c:5040)
==10996==    by 0x430E76: doshfunc (exec.c:4920)
==10996==    by 0x4302FB: execshfunc (exec.c:4557)
==10996==    by 0x42D8C1: execcmd (exec.c:3373)
==10996== 
==10996== 
==10996== 2 errors in context 2 of 2:
==10996== Conditional jump or move depends on uninitialised value(s)
==10996==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10996==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10996==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10996==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10996==    by 0x42D8E9: execcmd (exec.c:3378)
==10996==    by 0x428CA0: execpline2 (exec.c:1697)
==10996==    by 0x427FD2: execpline (exec.c:1484)
==10996==    by 0x42779A: execlist (exec.c:1275)
==10996==    by 0x42717C: execode (exec.c:1073)
==10996==    by 0x431299: runshfunc (exec.c:5040)
==10996==    by 0x430E76: doshfunc (exec.c:4920)
==10996==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10996== 
==10996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10999== 
==10999== HEAP SUMMARY:
==10999==     in use at exit: 3,113,247 bytes in 68,951 blocks
==10999==   total heap usage: 1,738,113 allocs, 1,669,162 frees, 140,063,175 bytes allocated
==10999== 
==11000== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11000-by-pythonnut-on-???
==11000== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11000-by-pythonnut-on-???
==11000== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11000-by-pythonnut-on-???
==11000== 
==11000== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11000== don't want to do, unless you know exactly what you're doing,
==11000== or are doing some strange experiment):
==11000==   /usr/lib/valgrind/../../bin/vgdb --pid=11000 ...command...
==11000== 
==11000== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11000==   /path/to/gdb ./zsh
==11000== and then give GDB the following command
==11000==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11000
==11000== --pid is optional if only one valgrind process is running
==11000== 
--11000-- Caught __NR_exit; running __libc_freeres()
==10999== Searching for pointers to 68,951 not-freed blocks
--10999--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10999--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10999--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10999--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10999--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10999--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10999--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10999--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10999--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10999--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10999--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10999--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10999--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10999--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10999--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10999--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10999--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10999--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10999--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10999--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10999--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10999--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10999--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10999--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10999--   Scanning root segment: 0x701a000..0x701afff (4096)
--10999--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10999--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10999--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10999--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10999--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10999--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10999--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10999--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10999--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10999--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--11000-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11000== 
==11000== HEAP SUMMARY:
==11000==     in use at exit: 3,137,387 bytes in 69,536 blocks
==11000==   total heap usage: 1,599,715 allocs, 1,530,179 frees, 129,186,530 bytes allocated
==11000== 
==11000== Searching for pointers to 69,536 not-freed blocks
--11000--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11000--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11000--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11000--   Scanning root segment: 0x4037000..0x403efff (32768)
--11000--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11000--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11000--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11000--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11000--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11000--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11000--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11000--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11000--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11000--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11000--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11000--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11000--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11000--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11000--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11000--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11000--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11000--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11000--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11000--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11000--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11000--   Scanning root segment: 0x701a000..0x701afff (4096)
--11000--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11000--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11000--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11000--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11000--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11000--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11000--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11000--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11000--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11000--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10999== Checked 4,787,208 bytes
==10999== 
==10999== LEAK SUMMARY:
==10999==    definitely lost: 3,173 bytes in 18 blocks
==10999==    indirectly lost: 6,756 bytes in 7 blocks
==10999==      possibly lost: 0 bytes in 0 blocks
==10999==    still reachable: 3,103,318 bytes in 68,926 blocks
==10999==         suppressed: 0 bytes in 0 blocks
==10999== Rerun with --leak-check=full to see details of leaked memory
==10999== 
==10999== Use --track-origins=yes to see where uninitialised values come from
==10999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10999== 
==10999== 1 errors in context 1 of 2:
==10999== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10999==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10999==    by 0x488CD0: stringsubst (subst.c:301)
==10999==    by 0x48801B: prefork (subst.c:77)
==10999==    by 0x42B318: execcmd (exec.c:2619)
==10999==    by 0x428CA0: execpline2 (exec.c:1697)
==10999==    by 0x427FD2: execpline (exec.c:1484)
==10999==    by 0x427756: execlist (exec.c:1267)
==10999==    by 0x42717C: execode (exec.c:1073)
==10999==    by 0x431299: runshfunc (exec.c:5040)
==10999==    by 0x430E76: doshfunc (exec.c:4920)
==10999==    by 0x4302FB: execshfunc (exec.c:4557)
==10999==    by 0x42D8C1: execcmd (exec.c:3373)
==10999== 
==10999== 
==10999== 2 errors in context 2 of 2:
==10999== Conditional jump or move depends on uninitialised value(s)
==10999==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10999==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10999==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10999==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10999==    by 0x42D8E9: execcmd (exec.c:3378)
==10999==    by 0x428CA0: execpline2 (exec.c:1697)
==10999==    by 0x427FD2: execpline (exec.c:1484)
==10999==    by 0x42779A: execlist (exec.c:1275)
==10999==    by 0x42717C: execode (exec.c:1073)
==10999==    by 0x431299: runshfunc (exec.c:5040)
==10999==    by 0x430E76: doshfunc (exec.c:4920)
==10999==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10999== 
==10999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11000== Checked 4,839,360 bytes
==11000== 
--11003-- Caught __NR_exit; running __libc_freeres()
==11003== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11003-by-pythonnut-on-???
==11003== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11003-by-pythonnut-on-???
==11003== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11003-by-pythonnut-on-???
==11003== 
==11003== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11003== don't want to do, unless you know exactly what you're doing,
==11003== or are doing some strange experiment):
==11003==   /usr/lib/valgrind/../../bin/vgdb --pid=11003 ...command...
==11003== 
==11003== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11003==   /path/to/gdb ./zsh
==11003== and then give GDB the following command
==11003==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11003
==11003== --pid is optional if only one valgrind process is running
==11003== 
==11000== LEAK SUMMARY:
==11000==    definitely lost: 2,221 bytes in 14 blocks
==11000==    indirectly lost: 6,796 bytes in 9 blocks
==11000==      possibly lost: 0 bytes in 0 blocks
==11000==    still reachable: 3,128,370 bytes in 69,513 blocks
==11000==         suppressed: 0 bytes in 0 blocks
==11000== Rerun with --leak-check=full to see details of leaked memory
==11000== 
==11000== Use --track-origins=yes to see where uninitialised values come from
==11000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11000== 
==11000== 1 errors in context 1 of 2:
==11000== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11000==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11000==    by 0x488CD0: stringsubst (subst.c:301)
==11000==    by 0x48801B: prefork (subst.c:77)
==11000==    by 0x42B318: execcmd (exec.c:2619)
==11000==    by 0x428CA0: execpline2 (exec.c:1697)
==11000==    by 0x427FD2: execpline (exec.c:1484)
==11000==    by 0x427756: execlist (exec.c:1267)
==11000==    by 0x42717C: execode (exec.c:1073)
==11000==    by 0x431299: runshfunc (exec.c:5040)
==11000==    by 0x430E76: doshfunc (exec.c:4920)
==11000==    by 0x4302FB: execshfunc (exec.c:4557)
==11000==    by 0x42D8C1: execcmd (exec.c:3373)
==11000== 
==11000== 
==11000== 2 errors in context 2 of 2:
==11000== Conditional jump or move depends on uninitialised value(s)
==11000==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11000==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11000==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11000==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11000==    by 0x42D8E9: execcmd (exec.c:3378)
==11000==    by 0x428CA0: execpline2 (exec.c:1697)
==11000==    by 0x427FD2: execpline (exec.c:1484)
==11000==    by 0x42779A: execlist (exec.c:1275)
==11000==    by 0x42717C: execode (exec.c:1073)
==11000==    by 0x431299: runshfunc (exec.c:5040)
==11000==    by 0x430E76: doshfunc (exec.c:4920)
==11000==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11000== 
==11000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--11003-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11004== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11004-by-pythonnut-on-???
==11004== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11004-by-pythonnut-on-???
==11004== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11004-by-pythonnut-on-???
==11004== 
==11004== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11004== don't want to do, unless you know exactly what you're doing,
==11004== or are doing some strange experiment):
==11004==   /usr/lib/valgrind/../../bin/vgdb --pid=11004 ...command...
==11004== 
==11004== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11004==   /path/to/gdb ./zsh
==11004== and then give GDB the following command
==11004==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11004
==11004== --pid is optional if only one valgrind process is running
==11004== 
--11004-- Caught __NR_exit; running __libc_freeres()
==11003== 
==11003== HEAP SUMMARY:
==11003==     in use at exit: 3,115,003 bytes in 69,006 blocks
==11003==   total heap usage: 1,738,209 allocs, 1,669,203 frees, 140,071,029 bytes allocated
==11003== 
--11004-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11003== Searching for pointers to 69,006 not-freed blocks
--11003--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11003--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11003--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11003--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11003--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11003--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11003--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11003--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11003--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11003--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11003--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11003--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11003--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11003--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11003--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11003--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11003--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11003--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11003--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11003--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11003--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11003--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11003--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11003--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11003--   Scanning root segment: 0x701a000..0x701afff (4096)
--11003--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11003--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11003--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11003--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11003--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11003--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11003--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11003--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11003--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11003--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11004== 
==11004== HEAP SUMMARY:
==11004==     in use at exit: 3,137,386 bytes in 69,536 blocks
==11004==   total heap usage: 1,599,720 allocs, 1,530,184 frees, 129,188,643 bytes allocated
==11004== 
==11004== Searching for pointers to 69,536 not-freed blocks
--11004--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11004--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11004--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11004--   Scanning root segment: 0x4037000..0x403efff (32768)
--11004--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11004--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11004--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11004--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11004--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11004--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11004--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11004--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11004--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11004--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11004--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11004--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11004--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11004--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11004--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11004--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11004--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11004--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11004--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11004--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11004--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11004--   Scanning root segment: 0x701a000..0x701afff (4096)
--11004--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11004--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11004--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11004--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11004--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11004--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11004--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11004--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11004--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11004--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11003== Checked 4,789,472 bytes
==11003== 
==11003== LEAK SUMMARY:
==11003==    definitely lost: 3,197 bytes in 19 blocks
==11003==    indirectly lost: 6,812 bytes in 10 blocks
==11003==      possibly lost: 0 bytes in 0 blocks
==11003==    still reachable: 3,104,994 bytes in 68,977 blocks
==11003==         suppressed: 0 bytes in 0 blocks
==11003== Rerun with --leak-check=full to see details of leaked memory
==11003== 
==11003== Use --track-origins=yes to see where uninitialised values come from
==11003== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11003== 
==11003== 1 errors in context 1 of 2:
==11003== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11003==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11003==    by 0x488CD0: stringsubst (subst.c:301)
==11003==    by 0x48801B: prefork (subst.c:77)
==11003==    by 0x42B318: execcmd (exec.c:2619)
==11003==    by 0x428CA0: execpline2 (exec.c:1697)
==11003==    by 0x427FD2: execpline (exec.c:1484)
==11003==    by 0x427756: execlist (exec.c:1267)
==11003==    by 0x42717C: execode (exec.c:1073)
==11003==    by 0x431299: runshfunc (exec.c:5040)
==11003==    by 0x430E76: doshfunc (exec.c:4920)
==11003==    by 0x4302FB: execshfunc (exec.c:4557)
==11003==    by 0x42D8C1: execcmd (exec.c:3373)
==11003== 
==11003== 
==11003== 2 errors in context 2 of 2:
==11003== Conditional jump or move depends on uninitialised value(s)
==11003==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11003==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11003==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11003==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11003==    by 0x42D8E9: execcmd (exec.c:3378)
==11003==    by 0x428CA0: execpline2 (exec.c:1697)
==11003==    by 0x427FD2: execpline (exec.c:1484)
==11003==    by 0x42779A: execlist (exec.c:1275)
==11003==    by 0x42717C: execode (exec.c:1073)
==11003==    by 0x431299: runshfunc (exec.c:5040)
==11003==    by 0x430E76: doshfunc (exec.c:4920)
==11003==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11003== 
==11003== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11004== Checked 4,839,360 bytes
==11004== 
==11004== LEAK SUMMARY:
==11004==    definitely lost: 2,221 bytes in 14 blocks
==11004==    indirectly lost: 6,796 bytes in 9 blocks
==11004==      possibly lost: 0 bytes in 0 blocks
==11004==    still reachable: 3,128,369 bytes in 69,513 blocks
==11004==         suppressed: 0 bytes in 0 blocks
==11004== Rerun with --leak-check=full to see details of leaked memory
==11004== 
==11004== Use --track-origins=yes to see where uninitialised values come from
==11004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11004== 
==11004== 1 errors in context 1 of 2:
==11004== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11004==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11004==    by 0x488CD0: stringsubst (subst.c:301)
==11004==    by 0x48801B: prefork (subst.c:77)
==11004==    by 0x42B318: execcmd (exec.c:2619)
==11004==    by 0x428CA0: execpline2 (exec.c:1697)
==11004==    by 0x427FD2: execpline (exec.c:1484)
==11004==    by 0x427756: execlist (exec.c:1267)
==11004==    by 0x42717C: execode (exec.c:1073)
==11004==    by 0x431299: runshfunc (exec.c:5040)
==11004==    by 0x430E76: doshfunc (exec.c:4920)
==11004==    by 0x4302FB: execshfunc (exec.c:4557)
==11004==    by 0x42D8C1: execcmd (exec.c:3373)
==11004== 
==11004== 
==11004== 2 errors in context 2 of 2:
==11004== Conditional jump or move depends on uninitialised value(s)
==11004==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11004==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11004==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11004==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11004==    by 0x42D8E9: execcmd (exec.c:3378)
==11004==    by 0x428CA0: execpline2 (exec.c:1697)
==11004==    by 0x427FD2: execpline (exec.c:1484)
==11004==    by 0x42779A: execlist (exec.c:1275)
==11004==    by 0x42717C: execode (exec.c:1073)
==11004==    by 0x431299: runshfunc (exec.c:5040)
==11004==    by 0x430E76: doshfunc (exec.c:4920)
==11004==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11004== 
==11004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF4ACC,  len 4
==11007== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11007-by-pythonnut-on-???
==11007== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11007-by-pythonnut-on-???
==11007== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11007-by-pythonnut-on-???
==11007== 
==11007== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11007== don't want to do, unless you know exactly what you're doing,
==11007== or are doing some strange experiment):
==11007==   /usr/lib/valgrind/../../bin/vgdb --pid=11007 ...command...
==11007== 
==11007== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11007==   /path/to/gdb ./zsh
==11007== and then give GDB the following command
==11007==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11007
==11007== --pid is optional if only one valgrind process is running
==11007== 
--11007-- Caught __NR_exit; running __libc_freeres()
--11005-- Caught __NR_exit; running __libc_freeres()
==11005== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11005-by-pythonnut-on-???
==11005== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11005-by-pythonnut-on-???
==11005== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11005-by-pythonnut-on-???
==11005== 
==11005== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11005== don't want to do, unless you know exactly what you're doing,
==11005== or are doing some strange experiment):
==11005==   /usr/lib/valgrind/../../bin/vgdb --pid=11005 ...command...
==11005== 
==11005== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11005==   /path/to/gdb ./zsh
==11005== and then give GDB the following command
==11005==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11005
==11005== --pid is optional if only one valgrind process is running
==11005== 
--11007-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--11005-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11007== 
==11007== HEAP SUMMARY:
==11007==     in use at exit: 3,137,385 bytes in 69,536 blocks
==11007==   total heap usage: 1,599,725 allocs, 1,530,189 frees, 129,190,756 bytes allocated
==11007== 
==11005== 
==11005== HEAP SUMMARY:
==11005==     in use at exit: 3,114,963 bytes in 69,005 blocks
==11005==   total heap usage: 1,738,217 allocs, 1,669,212 frees, 140,073,141 bytes allocated
==11005== 
==11007== Searching for pointers to 69,536 not-freed blocks
--11007--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11007--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11007--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11007--   Scanning root segment: 0x4037000..0x403efff (32768)
--11007--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11007--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11007--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11007--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11007--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11007--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11007--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11007--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11007--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11007--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11007--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11007--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11007--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11007--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11007--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11007--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11007--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11007--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11007--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11007--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11007--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11007--   Scanning root segment: 0x701a000..0x701afff (4096)
--11007--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11007--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11007--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11007--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11007--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11007--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11007--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11007--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11007--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11007--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11005== Searching for pointers to 69,005 not-freed blocks
--11005--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11005--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11005--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11005--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11005--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11005--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11005--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11005--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11005--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11005--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11005--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11005--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11005--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11005--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11005--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11005--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11005--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11005--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11005--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11005--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11005--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11005--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11005--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11005--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11005--   Scanning root segment: 0x701a000..0x701afff (4096)
--11005--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11005--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11005--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11005--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11005--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11005--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11005--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11005--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11005--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11005--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11005== Checked 4,789,120 bytes
==11005== 
==11007== Checked 4,839,360 bytes
==11007== 
==11005== LEAK SUMMARY:
==11005==    definitely lost: 3,189 bytes in 19 blocks
==11005==    indirectly lost: 6,756 bytes in 7 blocks
==11005==      possibly lost: 0 bytes in 0 blocks
==11005==    still reachable: 3,105,018 bytes in 68,979 blocks
==11005==         suppressed: 0 bytes in 0 blocks
==11005== Rerun with --leak-check=full to see details of leaked memory
==11005== 
==11005== Use --track-origins=yes to see where uninitialised values come from
==11005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11005== 
==11005== 1 errors in context 1 of 2:
==11005== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11005==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11005==    by 0x488CD0: stringsubst (subst.c:301)
==11005==    by 0x48801B: prefork (subst.c:77)
==11005==    by 0x42B318: execcmd (exec.c:2619)
==11005==    by 0x428CA0: execpline2 (exec.c:1697)
==11005==    by 0x427FD2: execpline (exec.c:1484)
==11005==    by 0x427756: execlist (exec.c:1267)
==11005==    by 0x42717C: execode (exec.c:1073)
==11005==    by 0x431299: runshfunc (exec.c:5040)
==11005==    by 0x430E76: doshfunc (exec.c:4920)
==11005==    by 0x4302FB: execshfunc (exec.c:4557)
==11005==    by 0x42D8C1: execcmd (exec.c:3373)
==11005== 
==11005== 
==11005== 2 errors in context 2 of 2:
==11005== Conditional jump or move depends on uninitialised value(s)
==11005==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11005==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11005==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11005==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11005==    by 0x42D8E9: execcmd (exec.c:3378)
==11005==    by 0x428CA0: execpline2 (exec.c:1697)
==11005==    by 0x427FD2: execpline (exec.c:1484)
==11005==    by 0x42779A: execlist (exec.c:1275)
==11005==    by 0x42717C: execode (exec.c:1073)
==11005==    by 0x431299: runshfunc (exec.c:5040)
==11005==    by 0x430E76: doshfunc (exec.c:4920)
==11005==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11005== 
==11005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11007== LEAK SUMMARY:
==11007==    definitely lost: 2,221 bytes in 14 blocks
==11007==    indirectly lost: 6,796 bytes in 9 blocks
==11007==      possibly lost: 0 bytes in 0 blocks
==11007==    still reachable: 3,128,368 bytes in 69,513 blocks
==11007==         suppressed: 0 bytes in 0 blocks
==11007== Rerun with --leak-check=full to see details of leaked memory
==11007== 
==11007== Use --track-origins=yes to see where uninitialised values come from
==11007== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11007== 
==11007== 1 errors in context 1 of 2:
==11007== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11007==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11007==    by 0x488CD0: stringsubst (subst.c:301)
==11007==    by 0x48801B: prefork (subst.c:77)
==11007==    by 0x42B318: execcmd (exec.c:2619)
==11007==    by 0x428CA0: execpline2 (exec.c:1697)
==11007==    by 0x427FD2: execpline (exec.c:1484)
==11007==    by 0x427756: execlist (exec.c:1267)
==11007==    by 0x42717C: execode (exec.c:1073)
==11007==    by 0x431299: runshfunc (exec.c:5040)
==11007==    by 0x430E76: doshfunc (exec.c:4920)
==11007==    by 0x4302FB: execshfunc (exec.c:4557)
==11007==    by 0x42D8C1: execcmd (exec.c:3373)
==11007== 
==11007== 
==11007== 2 errors in context 2 of 2:
==11007== Conditional jump or move depends on uninitialised value(s)
==11007==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11007==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11007==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11007==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11007==    by 0x42D8E9: execcmd (exec.c:3378)
==11007==    by 0x428CA0: execpline2 (exec.c:1697)
==11007==    by 0x427FD2: execpline (exec.c:1484)
==11007==    by 0x42779A: execlist (exec.c:1275)
==11007==    by 0x42717C: execode (exec.c:1073)
==11007==    by 0x431299: runshfunc (exec.c:5040)
==11007==    by 0x430E76: doshfunc (exec.c:4920)
==11007==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11007== 
==11007== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11009== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11009-by-pythonnut-on-???
==11009== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11009-by-pythonnut-on-???
==11009== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11009-by-pythonnut-on-???
==11009== 
==11009== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11009== don't want to do, unless you know exactly what you're doing,
==11009== or are doing some strange experiment):
==11009==   /usr/lib/valgrind/../../bin/vgdb --pid=11009 ...command...
==11009== 
==11009== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11009==   /path/to/gdb ./zsh
==11009== and then give GDB the following command
==11009==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11009
==11009== --pid is optional if only one valgrind process is running
==11009== 
--11009-- Caught __NR_exit; running __libc_freeres()
==11008== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11008-by-pythonnut-on-???
==11008== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11008-by-pythonnut-on-???
==11008== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11008-by-pythonnut-on-???
==11008== 
==11008== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11008== don't want to do, unless you know exactly what you're doing,
==11008== or are doing some strange experiment):
==11008==   /usr/lib/valgrind/../../bin/vgdb --pid=11008 ...command...
==11008== 
==11008== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11008==   /path/to/gdb ./zsh
==11008== and then give GDB the following command
==11008==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11008
==11008== --pid is optional if only one valgrind process is running
==11008== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--11009-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11009== 
==11009== HEAP SUMMARY:
==11009==     in use at exit: 3,137,384 bytes in 69,536 blocks
==11009==   total heap usage: 1,599,730 allocs, 1,530,194 frees, 129,192,869 bytes allocated
==11009== 
==11009== Searching for pointers to 69,536 not-freed blocks
--11009--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11009--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11009--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11009--   Scanning root segment: 0x4037000..0x403efff (32768)
--11009--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11009--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11009--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11009--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11009--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11009--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11009--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11009--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11009--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11009--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11009--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11009--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11009--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11009--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11009--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11009--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11009--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11009--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11009--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11009--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11009--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11009--   Scanning root segment: 0x701a000..0x701afff (4096)
--11009--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11009--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11009--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11009--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11009--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11009--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11009--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11009--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11009--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11009--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11009== Checked 4,839,360 bytes
==11009== 
==11009== LEAK SUMMARY:
==11009==    definitely lost: 2,221 bytes in 14 blocks
==11009==    indirectly lost: 6,796 bytes in 9 blocks
==11009==      possibly lost: 0 bytes in 0 blocks
==11009==    still reachable: 3,128,367 bytes in 69,513 blocks
==11009==         suppressed: 0 bytes in 0 blocks
==11009== Rerun with --leak-check=full to see details of leaked memory
==11009== 
==11009== Use --track-origins=yes to see where uninitialised values come from
==11009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11009== 
==11009== 1 errors in context 1 of 2:
==11009== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11009==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11009==    by 0x488CD0: stringsubst (subst.c:301)
==11009==    by 0x48801B: prefork (subst.c:77)
==11009==    by 0x42B318: execcmd (exec.c:2619)
==11009==    by 0x428CA0: execpline2 (exec.c:1697)
==11009==    by 0x427FD2: execpline (exec.c:1484)
==11009==    by 0x427756: execlist (exec.c:1267)
==11009==    by 0x42717C: execode (exec.c:1073)
==11009==    by 0x431299: runshfunc (exec.c:5040)
==11009==    by 0x430E76: doshfunc (exec.c:4920)
==11009==    by 0x4302FB: execshfunc (exec.c:4557)
==11009==    by 0x42D8C1: execcmd (exec.c:3373)
==11009== 
==11009== 
==11009== 2 errors in context 2 of 2:
==11009== Conditional jump or move depends on uninitialised value(s)
==11009==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11009==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11009==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11009==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11009==    by 0x42D8E9: execcmd (exec.c:3378)
==11009==    by 0x428CA0: execpline2 (exec.c:1697)
==11009==    by 0x427FD2: execpline (exec.c:1484)
==11009==    by 0x42779A: execlist (exec.c:1275)
==11009==    by 0x42717C: execode (exec.c:1073)
==11009==    by 0x431299: runshfunc (exec.c:5040)
==11009==    by 0x430E76: doshfunc (exec.c:4920)
==11009==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11009== 
==11009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11010== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11010-by-pythonnut-on-???
==11010== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11010-by-pythonnut-on-???
==11010== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11010-by-pythonnut-on-???
==11010== 
==11010== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11010== don't want to do, unless you know exactly what you're doing,
==11010== or are doing some strange experiment):
==11010==   /usr/lib/valgrind/../../bin/vgdb --pid=11010 ...command...
==11010== 
==11010== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11010==   /path/to/gdb ./zsh
==11010== and then give GDB the following command
==11010==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11010
==11010== --pid is optional if only one valgrind process is running
==11010== 
--11010-- Caught __NR_exit; running __libc_freeres()
--11010-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11010== 
==11010== HEAP SUMMARY:
==11010==     in use at exit: 3,137,383 bytes in 69,536 blocks
==11010==   total heap usage: 1,599,738 allocs, 1,530,202 frees, 129,196,522 bytes allocated
==11010== 
==11010== Searching for pointers to 69,536 not-freed blocks
--11010--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11010--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11010--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11010--   Scanning root segment: 0x4037000..0x403efff (32768)
--11010--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11010--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11010--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11010--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11010--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11010--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11010--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11010--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11010--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11010--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11010--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11010--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11010--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11010--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11010--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11010--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11010--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11010--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11010--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11010--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11010--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11010--   Scanning root segment: 0x701a000..0x701afff (4096)
--11010--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11010--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11010--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11010--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11010--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11010--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11010--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11010--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11010--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11010--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11010== Checked 4,839,360 bytes
==11010== 
==11010== LEAK SUMMARY:
==11010==    definitely lost: 2,221 bytes in 14 blocks
==11010==    indirectly lost: 6,796 bytes in 9 blocks
==11010==      possibly lost: 0 bytes in 0 blocks
==11010==    still reachable: 3,128,366 bytes in 69,513 blocks
==11010==         suppressed: 0 bytes in 0 blocks
==11010== Rerun with --leak-check=full to see details of leaked memory
==11010== 
==11010== Use --track-origins=yes to see where uninitialised values come from
==11010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11010== 
==11010== 1 errors in context 1 of 2:
==11010== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11010==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11010==    by 0x488CD0: stringsubst (subst.c:301)
==11010==    by 0x48801B: prefork (subst.c:77)
==11010==    by 0x42B318: execcmd (exec.c:2619)
==11010==    by 0x428CA0: execpline2 (exec.c:1697)
==11010==    by 0x427FD2: execpline (exec.c:1484)
==11010==    by 0x427756: execlist (exec.c:1267)
==11010==    by 0x42717C: execode (exec.c:1073)
==11010==    by 0x431299: runshfunc (exec.c:5040)
==11010==    by 0x430E76: doshfunc (exec.c:4920)
==11010==    by 0x4302FB: execshfunc (exec.c:4557)
==11010==    by 0x42D8C1: execcmd (exec.c:3373)
==11010== 
==11010== 
==11010== 2 errors in context 2 of 2:
==11010== Conditional jump or move depends on uninitialised value(s)
==11010==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11010==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11010==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11010==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11010==    by 0x42D8E9: execcmd (exec.c:3378)
==11010==    by 0x428CA0: execpline2 (exec.c:1697)
==11010==    by 0x427FD2: execpline (exec.c:1484)
==11010==    by 0x42779A: execlist (exec.c:1275)
==11010==    by 0x42717C: execode (exec.c:1073)
==11010==    by 0x431299: runshfunc (exec.c:5040)
==11010==    by 0x430E76: doshfunc (exec.c:4920)
==11010==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11010== 
==11010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11011== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11011-by-pythonnut-on-???
==11011== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11011-by-pythonnut-on-???
==11011== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11011-by-pythonnut-on-???
==11011== 
==11011== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11011== don't want to do, unless you know exactly what you're doing,
==11011== or are doing some strange experiment):
==11011==   /usr/lib/valgrind/../../bin/vgdb --pid=11011 ...command...
==11011== 
==11011== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11011==   /path/to/gdb ./zsh
==11011== and then give GDB the following command
==11011==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11011
==11011== --pid is optional if only one valgrind process is running
==11011== 
--11011-- Caught __NR_exit; running __libc_freeres()
--11011-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11011== 
==11011== HEAP SUMMARY:
==11011==     in use at exit: 3,137,386 bytes in 69,536 blocks
==11011==   total heap usage: 1,599,740 allocs, 1,530,204 frees, 129,197,099 bytes allocated
==11011== 
==11011== Searching for pointers to 69,536 not-freed blocks
--11011--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11011--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11011--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11011--   Scanning root segment: 0x4037000..0x403efff (32768)
--11011--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11011--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11011--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11011--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11011--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11011--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11011--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11011--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11011--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11011--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11011--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11011--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11011--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11011--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11011--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11011--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11011--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11011--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11011--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11011--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11011--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11011--   Scanning root segment: 0x701a000..0x701afff (4096)
--11011--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11011--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11011--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11011--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11011--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11011--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11011--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11011--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11011--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11011--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11011== Checked 4,839,360 bytes
==11011== 
==11011== LEAK SUMMARY:
==11011==    definitely lost: 2,221 bytes in 14 blocks
==11011==    indirectly lost: 6,796 bytes in 9 blocks
==11011==      possibly lost: 0 bytes in 0 blocks
==11011==    still reachable: 3,128,369 bytes in 69,513 blocks
==11011==         suppressed: 0 bytes in 0 blocks
==11011== Rerun with --leak-check=full to see details of leaked memory
==11011== 
==11011== Use --track-origins=yes to see where uninitialised values come from
==11011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11011== 
==11011== 1 errors in context 1 of 2:
==11011== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11011==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11011==    by 0x488CD0: stringsubst (subst.c:301)
==11011==    by 0x48801B: prefork (subst.c:77)
==11011==    by 0x42B318: execcmd (exec.c:2619)
==11011==    by 0x428CA0: execpline2 (exec.c:1697)
==11011==    by 0x427FD2: execpline (exec.c:1484)
==11011==    by 0x427756: execlist (exec.c:1267)
==11011==    by 0x42717C: execode (exec.c:1073)
==11011==    by 0x431299: runshfunc (exec.c:5040)
==11011==    by 0x430E76: doshfunc (exec.c:4920)
==11011==    by 0x4302FB: execshfunc (exec.c:4557)
==11011==    by 0x42D8C1: execcmd (exec.c:3373)
==11011== 
==11011== 
==11011== 2 errors in context 2 of 2:
==11011== Conditional jump or move depends on uninitialised value(s)
==11011==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11011==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11011==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11011==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11011==    by 0x42D8E9: execcmd (exec.c:3378)
==11011==    by 0x428CA0: execpline2 (exec.c:1697)
==11011==    by 0x427FD2: execpline (exec.c:1484)
==11011==    by 0x42779A: execlist (exec.c:1275)
==11011==    by 0x42717C: execode (exec.c:1073)
==11011==    by 0x431299: runshfunc (exec.c:5040)
==11011==    by 0x430E76: doshfunc (exec.c:4920)
==11011==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11011== 
==11011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11012== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11012-by-pythonnut-on-???
==11012== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11012-by-pythonnut-on-???
==11012== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11012-by-pythonnut-on-???
==11012== 
==11012== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11012== don't want to do, unless you know exactly what you're doing,
==11012== or are doing some strange experiment):
==11012==   /usr/lib/valgrind/../../bin/vgdb --pid=11012 ...command...
==11012== 
==11012== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11012==   /path/to/gdb ./zsh
==11012== and then give GDB the following command
==11012==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11012
==11012== --pid is optional if only one valgrind process is running
==11012== 
--11013-- Caught __NR_exit; running __libc_freeres()
==11013== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11013-by-pythonnut-on-???
==11013== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11013-by-pythonnut-on-???
==11013== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11013-by-pythonnut-on-???
==11013== 
==11013== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11013== don't want to do, unless you know exactly what you're doing,
==11013== or are doing some strange experiment):
==11013==   /usr/lib/valgrind/../../bin/vgdb --pid=11013 ...command...
==11013== 
==11013== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11013==   /path/to/gdb ./zsh
==11013== and then give GDB the following command
==11013==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11013
==11013== --pid is optional if only one valgrind process is running
==11013== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
--11013-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11013== 
==11013== HEAP SUMMARY:
==11013==     in use at exit: 3,137,636 bytes in 69,541 blocks
==11013==   total heap usage: 1,599,745 allocs, 1,530,204 frees, 129,200,689 bytes allocated
==11013== 
==11013== Searching for pointers to 69,541 not-freed blocks
--11013--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11013--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11013--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11013--   Scanning root segment: 0x4037000..0x403efff (32768)
--11013--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11013--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11013--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11013--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11013--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11013--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11013--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11013--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11013--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11013--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11013--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11013--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11013--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11013--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11013--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11013--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11013--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11013--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11013--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11013--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11013--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11013--   Scanning root segment: 0x701a000..0x701afff (4096)
--11013--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11013--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11013--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11013--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11013--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11013--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11013--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11013--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11013--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11013--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11017== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11017-by-pythonnut-on-???
==11017== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11017-by-pythonnut-on-???
==11017== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11017-by-pythonnut-on-???
==11017== 
==11017== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11017== don't want to do, unless you know exactly what you're doing,
==11017== or are doing some strange experiment):
==11017==   /usr/lib/valgrind/../../bin/vgdb --pid=11017 ...command...
==11017== 
==11017== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11017==   /path/to/gdb ./zsh
==11017== and then give GDB the following command
==11017==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11017
==11017== --pid is optional if only one valgrind process is running
==11017== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==11012== 
==11012== Process terminating with default action of signal 15 (SIGTERM)
==10928== 
==10928== Process terminating with default action of signal 15 (SIGTERM)
==10074== 
==10074== Process terminating with default action of signal 15 (SIGTERM)
==10074==    at 0x59EED90: sigprocmask (in /usr/lib/libc-2.20.so)
==10074==    by 0x484CF4: signal_block (signals.c:212)
==10074==    by 0x42841B: execpline (exec.c:1561)
==10074==    by 0x427756: execlist (exec.c:1267)
==10074==    by 0x4564F1: execwhile (loop.c:420)
==10074==    by 0x42D731: execcmd (exec.c:3336)
==10074==    by 0x428CA0: execpline2 (exec.c:1697)
==10074==    by 0x428F63: execpline2 (exec.c:1758)
==10074==    by 0x427FD2: execpline (exec.c:1484)
==10074==    by 0x427756: execlist (exec.c:1267)
==10074==    by 0x45689D: execif (loop.c:525)
==10074==    by 0x42D731: execcmd (exec.c:3336)
--10074-- Caught __NR_exit; running __libc_freeres()
==10928==    at 0x5A9677E: __read_nocancel (in /usr/lib/libc-2.20.so)
==10928==    by 0x5A308CF: _IO_file_underflow@@GLIBC_2.2.5 (in /usr/lib/libc-2.20.so)
==10928==    by 0x5A317CD: _IO_default_uflow (in /usr/lib/libc-2.20.so)
==10928==    by 0x5A2CF17: getc (in /usr/lib/libc-2.20.so)
==10928==    by 0x42EC76: readoutput (exec.c:3894)
==10928==    by 0x42EA40: getoutput (exec.c:3859)
==10928==    by 0x488C77: stringsubst (subst.c:293)
==10928==    by 0x48801B: prefork (subst.c:77)
==10928==    by 0x42A2EA: addvars (exec.c:2239)
==10928==    by 0x4272AB: execsimple (exec.c:1116)
==10928==    by 0x42761D: execlist (exec.c:1238)
==10928==    by 0x42717C: execode (exec.c:1073)
--10928-- Caught __NR_exit; running __libc_freeres()
==10930== 
==10930== Process terminating with default action of signal 15 (SIGTERM)
==10930==    at 0x5A9677E: __read_nocancel (in /usr/lib/libc-2.20.so)
==10930==    by 0x5A308CF: _IO_file_underflow@@GLIBC_2.2.5 (in /usr/lib/libc-2.20.so)
==10930==    by 0x5A317CD: _IO_default_uflow (in /usr/lib/libc-2.20.so)
==10930==    by 0x5A2CF17: getc (in /usr/lib/libc-2.20.so)
==10930==    by 0x42EC76: readoutput (exec.c:3894)
==10930==    by 0x42EA40: getoutput (exec.c:3859)
==11012==    at 0x59EEE46: sigsuspend (in /usr/lib/libc-2.20.so)
==10930==    by 0x488C77: stringsubst (subst.c:293)
==10930==    by 0x48801B: prefork (subst.c:77)
==10930==    by 0x42A2EA: addvars (exec.c:2239)
==11012==    by 0x484F59: signal_suspend (signals.c:375)
==10930==    by 0x4272AB: execsimple (exec.c:1116)
==11012==    by 0x44D409: zwaitjob (jobs.c:1454)
==10930==    by 0x42761D: execlist (exec.c:1238)
==11012==    by 0x44D68B: waitjobs (jobs.c:1499)
==10930==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x4283AC: execpline (exec.c:1560)
==11012==    by 0x427756: execlist (exec.c:1267)
==11012==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x42EB38: getoutput (exec.c:3871)
==11012==    by 0x488C77: stringsubst (subst.c:293)
==11012==    by 0x48801B: prefork (subst.c:77)
--10930-- Caught __NR_exit; running __libc_freeres()
==11012==    by 0x42A2EA: addvars (exec.c:2239)
==11012==    by 0x4272AB: execsimple (exec.c:1116)
--11012-- Caught __NR_exit; running __libc_freeres()
==11018== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11018-by-pythonnut-on-???
==11018== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11018-by-pythonnut-on-???
==11018== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11018-by-pythonnut-on-???
==11018== 
==11018== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11018== don't want to do, unless you know exactly what you're doing,
==11018== or are doing some strange experiment):
==11018==   /usr/lib/valgrind/../../bin/vgdb --pid=11018 ...command...
==11018== 
==11018== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11018==   /path/to/gdb ./zsh
==11018== and then give GDB the following command
==11018==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11018
==11018== --pid is optional if only one valgrind process is running
==11018== 
--11018-- Caught __NR_exit; running __libc_freeres()
--11012-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10074-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10928-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10930-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11012== 
==10928== 
==10074== 
==11013== Checked 4,840,240 bytes
==11013== 
==10928== HEAP SUMMARY:
==10928==     in use at exit: 3,132,504 bytes in 69,342 blocks
==10928==   total heap usage: 1,599,432 allocs, 1,530,090 frees, 129,149,408 bytes allocated
==10928== 
==11012== HEAP SUMMARY:
==11012==     in use at exit: 3,137,980 bytes in 69,541 blocks
==11012==   total heap usage: 1,599,748 allocs, 1,530,207 frees, 129,201,265 bytes allocated
==11012== 
==10074== HEAP SUMMARY:
==10074==     in use at exit: 3,129,214 bytes in 69,252 blocks
==10074==   total heap usage: 1,605,341 allocs, 1,536,089 frees, 129,494,873 bytes allocated
==10074== 
==10930== 
==10930== HEAP SUMMARY:
==10930==     in use at exit: 3,136,604 bytes in 69,479 blocks
==10930==   total heap usage: 1,599,682 allocs, 1,530,203 frees, 129,199,561 bytes allocated
==10930== 
--11018-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11018== 
==11013== LEAK SUMMARY:
==11013==    definitely lost: 2,221 bytes in 14 blocks
==11013==    indirectly lost: 6,796 bytes in 9 blocks
==11013==      possibly lost: 0 bytes in 0 blocks
==11013==    still reachable: 3,128,619 bytes in 69,518 blocks
==11013==         suppressed: 0 bytes in 0 blocks
==11013== Rerun with --leak-check=full to see details of leaked memory
==11013== 
==11013== Use --track-origins=yes to see where uninitialised values come from
==11013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11013== 
==11013== 1 errors in context 1 of 2:
==11013== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11013==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11013==    by 0x488CD0: stringsubst (subst.c:301)
==11013==    by 0x48801B: prefork (subst.c:77)
==11013==    by 0x42B318: execcmd (exec.c:2619)
==11013==    by 0x428CA0: execpline2 (exec.c:1697)
==11013==    by 0x427FD2: execpline (exec.c:1484)
==11013==    by 0x427756: execlist (exec.c:1267)
==11013==    by 0x42717C: execode (exec.c:1073)
==11013==    by 0x431299: runshfunc (exec.c:5040)
==11013==    by 0x430E76: doshfunc (exec.c:4920)
==11013==    by 0x4302FB: execshfunc (exec.c:4557)
==11013==    by 0x42D8C1: execcmd (exec.c:3373)
==11013== 
==11013== 
==11013== 2 errors in context 2 of 2:
==11013== Conditional jump or move depends on uninitialised value(s)
==11013==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11013==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11013==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11013==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11013==    by 0x42D8E9: execcmd (exec.c:3378)
==11013==    by 0x428CA0: execpline2 (exec.c:1697)
==11013==    by 0x427FD2: execpline (exec.c:1484)
==11013==    by 0x42779A: execlist (exec.c:1275)
==11013==    by 0x42717C: execode (exec.c:1073)
==11013==    by 0x431299: runshfunc (exec.c:5040)
==11013==    by 0x430E76: doshfunc (exec.c:4920)
==11013==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11013== 
==11013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== HEAP SUMMARY:
==11018==     in use at exit: 3,115,586 bytes in 69,011 blocks
==11018==   total heap usage: 1,776,833 allocs, 1,707,822 frees, 141,630,595 bytes allocated
==11018== 
==11012== Searching for pointers to 69,541 not-freed blocks
--11012--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11012--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11012--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11012--   Scanning root segment: 0x4037000..0x403efff (32768)
--11012--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11012--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11012--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11012--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11012--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11012--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11012--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11012--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11012--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11012--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11012--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11012--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11012--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11012--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11012--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11012--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11012--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10928== Searching for pointers to 69,342 not-freed blocks
--10928--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10928--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11012--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11012--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11012--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11012--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10928--   Scanning root segment: 0x4022000..0x4027fff (24576)
--11012--   Scanning root segment: 0x701a000..0x701afff (4096)
--11012--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11012--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10928--   Scanning root segment: 0x4037000..0x403afff (16384)
--11012--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11012--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10928--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11012--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11012--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10928--   Scanning root segment: 0x4222000..0x4222fff (4096)
==10930== Searching for pointers to 69,479 not-freed blocks
--10930--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10928--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11012--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10928--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11012--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10928--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10928--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11012--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10928--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11012--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10928--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10928--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10930--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10928--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10928--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10928--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10928--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10928--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10928--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10928--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10930--   Scanning root segment: 0x4022000..0x4027fff (24576)
--10928--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10930--   Scanning root segment: 0x4037000..0x403efff (32768)
--10930--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10928--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10930--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10930--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10928--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10930--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10930--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10928--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10930--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10930--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10928--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10930--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10930--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10928--   Scanning root segment: 0x701a000..0x701afff (4096)
--10928--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10930--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10930--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10928--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10930--   Scanning root segment: 0x59ba000..0x59bafff (4096)
==10074== Searching for pointers to 69,252 not-freed blocks
--10928--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10074--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10930--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10928--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10930--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10928--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10930--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10930--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10928--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10928--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10928--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10928--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10928--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10074--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10930--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10074--   Scanning root segment: 0x4037000..0x403afff (16384)
--10074--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10930--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10930--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10074--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10074--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10074--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10930--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10074--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10074--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10930--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10074--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10074--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10074--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10930--   Scanning root segment: 0x701a000..0x701afff (4096)
--10074--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10930--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10074--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10930--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10074--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10074--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10930--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10074--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10930--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10930--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10074--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10930--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10930--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10930--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10074--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10930--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10930--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10074--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10074--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10074--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10074--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10074--   Scanning root segment: 0x701a000..0x701afff (4096)
--10074--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10074--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10074--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10074--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10074--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10074--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10074--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10074--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10074--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11018== Searching for pointers to 69,011 not-freed blocks
--11018--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11018--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11018--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11018--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11018--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11018--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11018--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11018--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11018--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11018--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11018--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11018--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11018--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11018--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11018--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11018--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11018--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11018--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11018--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11018--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11018--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11018--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11018--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11018--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11018--   Scanning root segment: 0x701a000..0x701afff (4096)
--11018--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11018--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11018--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11018--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11018--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11018--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11018--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11018--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11018--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11018--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11012== Checked 4,840,360 bytes
==11012== 
==10930== Checked 4,842,720 bytes
==10930== 
==10928== Checked 4,819,488 bytes
==10928== 
==10074== Checked 4,809,608 bytes
==10074== 
==11012== LEAK SUMMARY:
==11012==    definitely lost: 2,221 bytes in 14 blocks
==11012==    indirectly lost: 6,796 bytes in 9 blocks
==11012==      possibly lost: 0 bytes in 0 blocks
==11012==    still reachable: 3,128,963 bytes in 69,518 blocks
==11012==         suppressed: 0 bytes in 0 blocks
==11012== Rerun with --leak-check=full to see details of leaked memory
==11012== 
==11012== Use --track-origins=yes to see where uninitialised values come from
==11012== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11012== 
==11012== 1 errors in context 1 of 2:
==11012== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11012==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11012==    by 0x488CD0: stringsubst (subst.c:301)
==11012==    by 0x48801B: prefork (subst.c:77)
==11012==    by 0x42B318: execcmd (exec.c:2619)
==11012==    by 0x428CA0: execpline2 (exec.c:1697)
==11012==    by 0x427FD2: execpline (exec.c:1484)
==11012==    by 0x427756: execlist (exec.c:1267)
==11012==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x431299: runshfunc (exec.c:5040)
==11012==    by 0x430E76: doshfunc (exec.c:4920)
==11012==    by 0x4302FB: execshfunc (exec.c:4557)
==11012==    by 0x42D8C1: execcmd (exec.c:3373)
==11012== 
==11012== 
==11012== 2 errors in context 2 of 2:
==11012== Conditional jump or move depends on uninitialised value(s)
==11012==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11012==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11012==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11012==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11012==    by 0x42D8E9: execcmd (exec.c:3378)
==11012==    by 0x428CA0: execpline2 (exec.c:1697)
==11012==    by 0x427FD2: execpline (exec.c:1484)
==11012==    by 0x42779A: execlist (exec.c:1275)
==11012==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x431299: runshfunc (exec.c:5040)
==11012==    by 0x430E76: doshfunc (exec.c:4920)
==11012==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11012== 
==11012== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10928== LEAK SUMMARY:
==10928==    definitely lost: 2,221 bytes in 14 blocks
==10928==    indirectly lost: 6,796 bytes in 9 blocks
==10928==      possibly lost: 0 bytes in 0 blocks
==10928==    still reachable: 3,123,487 bytes in 69,319 blocks
==10928==         suppressed: 0 bytes in 0 blocks
==10928== Rerun with --leak-check=full to see details of leaked memory
==10928== 
==10928== Use --track-origins=yes to see where uninitialised values come from
==10928== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10928== 
==10928== 1 errors in context 1 of 2:
==10928== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10928==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10928==    by 0x488CD0: stringsubst (subst.c:301)
==10928==    by 0x48801B: prefork (subst.c:77)
==10928==    by 0x42B318: execcmd (exec.c:2619)
==10928==    by 0x428CA0: execpline2 (exec.c:1697)
==10928==    by 0x427FD2: execpline (exec.c:1484)
==10928==    by 0x427756: execlist (exec.c:1267)
==10928==    by 0x42717C: execode (exec.c:1073)
==10928==    by 0x431299: runshfunc (exec.c:5040)
==10928==    by 0x430E76: doshfunc (exec.c:4920)
==10928==    by 0x4302FB: execshfunc (exec.c:4557)
==10928==    by 0x42D8C1: execcmd (exec.c:3373)
==10928== 
==10928== 
==10928== 2 errors in context 2 of 2:
==10928== Conditional jump or move depends on uninitialised value(s)
==10928==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10928==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10928==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10928==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10928==    by 0x42D8E9: execcmd (exec.c:3378)
==10928==    by 0x428CA0: execpline2 (exec.c:1697)
==10928==    by 0x427FD2: execpline (exec.c:1484)
==10928==    by 0x42779A: execlist (exec.c:1275)
==10928==    by 0x42717C: execode (exec.c:1073)
==10928==    by 0x431299: runshfunc (exec.c:5040)
==10928==    by 0x430E76: doshfunc (exec.c:4920)
==10928==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10928== 
==10928== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10930== LEAK SUMMARY:
==10930==    definitely lost: 2,221 bytes in 14 blocks
==10930==    indirectly lost: 6,796 bytes in 9 blocks
==10930==      possibly lost: 0 bytes in 0 blocks
==10930==    still reachable: 3,127,587 bytes in 69,456 blocks
==10930==         suppressed: 0 bytes in 0 blocks
==10930== Rerun with --leak-check=full to see details of leaked memory
==10930== 
==10930== Use --track-origins=yes to see where uninitialised values come from
==10930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10930== 
==10930== 1 errors in context 1 of 2:
==10930== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10930==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10930==    by 0x488CD0: stringsubst (subst.c:301)
==10930==    by 0x48801B: prefork (subst.c:77)
==10930==    by 0x42B318: execcmd (exec.c:2619)
==10930==    by 0x428CA0: execpline2 (exec.c:1697)
==10930==    by 0x427FD2: execpline (exec.c:1484)
==10930==    by 0x427756: execlist (exec.c:1267)
==10930==    by 0x42717C: execode (exec.c:1073)
==10930==    by 0x431299: runshfunc (exec.c:5040)
==10930==    by 0x430E76: doshfunc (exec.c:4920)
==10930==    by 0x4302FB: execshfunc (exec.c:4557)
==10930==    by 0x42D8C1: execcmd (exec.c:3373)
==10930== 
==10930== 
==10930== 2 errors in context 2 of 2:
==10930== Conditional jump or move depends on uninitialised value(s)
==10930==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10930==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10930==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10930==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10930==    by 0x42D8E9: execcmd (exec.c:3378)
==10930==    by 0x428CA0: execpline2 (exec.c:1697)
==10930==    by 0x427FD2: execpline (exec.c:1484)
==10930==    by 0x42779A: execlist (exec.c:1275)
==10930==    by 0x42717C: execode (exec.c:1073)
==10930==    by 0x431299: runshfunc (exec.c:5040)
==10930==    by 0x430E76: doshfunc (exec.c:4920)
==10930==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10930== 
==10930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== Checked 4,789,280 bytes
==11018== 
==10074== LEAK SUMMARY:
==10074==    definitely lost: 2,197 bytes in 13 blocks
==10074==    indirectly lost: 6,756 bytes in 7 blocks
==10074==      possibly lost: 0 bytes in 0 blocks
==10074==    still reachable: 3,120,261 bytes in 69,232 blocks
==10074==         suppressed: 0 bytes in 0 blocks
==10074== Rerun with --leak-check=full to see details of leaked memory
==10074== 
==10074== Use --track-origins=yes to see where uninitialised values come from
==10074== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10074== 
==10074== 1 errors in context 1 of 2:
==10074== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10074==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10074==    by 0x488CD0: stringsubst (subst.c:301)
==10074==    by 0x48801B: prefork (subst.c:77)
==10074==    by 0x42B318: execcmd (exec.c:2619)
==10074==    by 0x428CA0: execpline2 (exec.c:1697)
==10074==    by 0x427FD2: execpline (exec.c:1484)
==10074==    by 0x427756: execlist (exec.c:1267)
==10074==    by 0x42717C: execode (exec.c:1073)
==10074==    by 0x431299: runshfunc (exec.c:5040)
==10074==    by 0x430E76: doshfunc (exec.c:4920)
==10074==    by 0x4302FB: execshfunc (exec.c:4557)
==10074==    by 0x42D8C1: execcmd (exec.c:3373)
==10074== 
==10074== 
==10074== 2 errors in context 2 of 2:
==10074== Conditional jump or move depends on uninitialised value(s)
==10074==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10074==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10074==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10074==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10074==    by 0x42D8E9: execcmd (exec.c:3378)
==10074==    by 0x428CA0: execpline2 (exec.c:1697)
==10074==    by 0x427FD2: execpline (exec.c:1484)
==10074==    by 0x42779A: execlist (exec.c:1275)
==10074==    by 0x42717C: execode (exec.c:1073)
==10074==    by 0x431299: runshfunc (exec.c:5040)
==10074==    by 0x430E76: doshfunc (exec.c:4920)
==10074==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10074== 
==10074== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== LEAK SUMMARY:
==11018==    definitely lost: 3,213 bytes in 20 blocks
==11018==    indirectly lost: 6,812 bytes in 10 blocks
==11018==      possibly lost: 0 bytes in 0 blocks
==11018==    still reachable: 3,105,561 bytes in 68,981 blocks
==11018==         suppressed: 0 bytes in 0 blocks
==11018== Rerun with --leak-check=full to see details of leaked memory
==11018== 
==11018== Use --track-origins=yes to see where uninitialised values come from
==11018== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== 
==11018== 1 errors in context 1 of 2:
==11018== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11018==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11018==    by 0x488CD0: stringsubst (subst.c:301)
==11018==    by 0x48801B: prefork (subst.c:77)
==11018==    by 0x42B318: execcmd (exec.c:2619)
==11018==    by 0x428CA0: execpline2 (exec.c:1697)
==11018==    by 0x427FD2: execpline (exec.c:1484)
==11018==    by 0x427756: execlist (exec.c:1267)
==11018==    by 0x42717C: execode (exec.c:1073)
==11018==    by 0x431299: runshfunc (exec.c:5040)
==11018==    by 0x430E76: doshfunc (exec.c:4920)
==11018==    by 0x4302FB: execshfunc (exec.c:4557)
==11018==    by 0x42D8C1: execcmd (exec.c:3373)
==11018== 
==11018== 
==11018== 2 errors in context 2 of 2:
==11018== Conditional jump or move depends on uninitialised value(s)
==11018==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11018==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11018==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11018==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11018==    by 0x42D8E9: execcmd (exec.c:3378)
==11018==    by 0x428CA0: execpline2 (exec.c:1697)
==11018==    by 0x427FD2: execpline (exec.c:1484)
==11018==    by 0x42779A: execlist (exec.c:1275)
==11018==    by 0x42717C: execode (exec.c:1073)
==11018==    by 0x431299: runshfunc (exec.c:5040)
==11018==    by 0x430E76: doshfunc (exec.c:4920)
==11018==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11018== 
==11018== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF514C,  len 4
--11019-- Caught __NR_exit; running __libc_freeres()
==11019== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11019-by-pythonnut-on-???
==11019== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11019-by-pythonnut-on-???
==11019== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11019-by-pythonnut-on-???
==11019== 
==11019== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11019== don't want to do, unless you know exactly what you're doing,
==11019== or are doing some strange experiment):
==11019==   /usr/lib/valgrind/../../bin/vgdb --pid=11019 ...command...
==11019== 
==11019== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11019==   /path/to/gdb ./zsh
==11019== and then give GDB the following command
==11019==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11019
==11019== --pid is optional if only one valgrind process is running
==11019== 
--11019-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11019== 
==11019== HEAP SUMMARY:
==11019==     in use at exit: 3,115,442 bytes in 69,007 blocks
==11019==   total heap usage: 1,776,839 allocs, 1,707,832 frees, 141,632,619 bytes allocated
==11019== 
==11019== Searching for pointers to 69,007 not-freed blocks
--11019--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11019--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11019--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11019--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11019--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11019--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11019--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11019--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11019--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11019--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11019--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11019--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11019--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11019--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11019--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11019--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11019--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11019--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11019--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11019--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11019--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11019--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11019--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11019--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11019--   Scanning root segment: 0x701a000..0x701afff (4096)
--11019--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11019--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11019--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11019--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11019--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11019--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11019--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11019--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11019--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11019--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11019== Checked 4,788,816 bytes
==11019== 
==11019== LEAK SUMMARY:
==11019==    definitely lost: 3,205 bytes in 20 blocks
==11019==    indirectly lost: 6,756 bytes in 7 blocks
==11019==      possibly lost: 0 bytes in 0 blocks
==11019==    still reachable: 3,105,481 bytes in 68,980 blocks
==11019==         suppressed: 0 bytes in 0 blocks
==11019== Rerun with --leak-check=full to see details of leaked memory
==11019== 
==11019== Use --track-origins=yes to see where uninitialised values come from
==11019== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11019== 
==11019== 1 errors in context 1 of 2:
==11019== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11019==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11019==    by 0x488CD0: stringsubst (subst.c:301)
==11019==    by 0x48801B: prefork (subst.c:77)
==11019==    by 0x42B318: execcmd (exec.c:2619)
==11019==    by 0x428CA0: execpline2 (exec.c:1697)
==11019==    by 0x427FD2: execpline (exec.c:1484)
==11019==    by 0x427756: execlist (exec.c:1267)
==11019==    by 0x42717C: execode (exec.c:1073)
==11019==    by 0x431299: runshfunc (exec.c:5040)
==11019==    by 0x430E76: doshfunc (exec.c:4920)
==11019==    by 0x4302FB: execshfunc (exec.c:4557)
==11019==    by 0x42D8C1: execcmd (exec.c:3373)
==11019== 
==11019== 
==11019== 2 errors in context 2 of 2:
==11019== Conditional jump or move depends on uninitialised value(s)
==11019==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11019==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11019==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11019==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11019==    by 0x42D8E9: execcmd (exec.c:3378)
==11019==    by 0x428CA0: execpline2 (exec.c:1697)
==11019==    by 0x427FD2: execpline (exec.c:1484)
==11019==    by 0x42779A: execlist (exec.c:1275)
==11019==    by 0x42717C: execode (exec.c:1073)
==11019==    by 0x431299: runshfunc (exec.c:5040)
==11019==    by 0x430E76: doshfunc (exec.c:4920)
==11019==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11019== 
==11019== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF561C,  len 4
--7806-- Caught __NR_exit; running __libc_freeres()
--7806-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7806== 
==7806== HEAP SUMMARY:
==7806==     in use at exit: 3,113,959 bytes in 68,947 blocks
==7806==   total heap usage: 1,776,798 allocs, 1,707,851 frees, 141,637,222 bytes allocated
==7806== 
==7806== Searching for pointers to 68,947 not-freed blocks
--7806--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7806--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7806--   Scanning root segment: 0x4022000..0x4026fff (20480)
--7806--   Scanning root segment: 0x4049000..0x404cfff (16384)
--7806--   Scanning root segment: 0x4222000..0x4222fff (4096)
--7806--   Scanning root segment: 0x4223000..0x4223fff (4096)
--7806--   Scanning root segment: 0x4224000..0x4224fff (4096)
--7806--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7806--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7806--   Scanning root segment: 0x5041000..0x5041fff (4096)
--7806--   Scanning root segment: 0x5245000..0x5245fff (4096)
--7806--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--7806--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--7806--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7806--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--7806--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7806--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7806--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7806--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7806--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7806--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7806--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7806--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7806--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7806--   Scanning root segment: 0x701a000..0x701afff (4096)
--7806--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--7806--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--7806--   Scanning root segment: 0xae51000..0xae52fff (8192)
--7806--   Scanning root segment: 0xb054000..0xb054fff (4096)
--7806--   Scanning root segment: 0xb268000..0xb268fff (4096)
--7806--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--7806--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--7806--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--7806--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--7806--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==7806== Checked 4,786,664 bytes
==7806== 
==7806== LEAK SUMMARY:
==7806==    definitely lost: 3,205 bytes in 20 blocks
==7806==    indirectly lost: 6,756 bytes in 7 blocks
==7806==      possibly lost: 0 bytes in 0 blocks
==7806==    still reachable: 3,103,998 bytes in 68,920 blocks
==7806==         suppressed: 0 bytes in 0 blocks
==7806== Rerun with --leak-check=full to see details of leaked memory
==7806== 
==7806== Use --track-origins=yes to see where uninitialised values come from
==7806== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== 
==7806== 1 errors in context 1 of 2:
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806==    by 0x488CD0: stringsubst (subst.c:301)
==7806==    by 0x48801B: prefork (subst.c:77)
==7806==    by 0x42B318: execcmd (exec.c:2619)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x427756: execlist (exec.c:1267)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x4302FB: execshfunc (exec.c:4557)
==7806==    by 0x42D8C1: execcmd (exec.c:3373)
==7806== 
==7806== 
==7806== 2 errors in context 2 of 2:
==7806== Conditional jump or move depends on uninitialised value(s)
==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==7806==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==7806==    by 0x40EFC2: execbuiltin (builtin.c:450)
==7806==    by 0x42D8E9: execcmd (exec.c:3378)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x42779A: execlist (exec.c:1275)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==7806== 
==7806== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)

  parent reply	other threads:[~2014-12-15 21:21 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-12-13 19:49 Jonathan H
2014-12-13 23:28 ` Bart Schaefer
2014-12-13 23:36   ` Jonathan H
2014-12-14  4:40     ` Bart Schaefer
2014-12-14 18:20       ` Peter Stephenson
2014-12-14 18:43         ` Bart Schaefer
2014-12-15 21:20         ` Jonathan H [this message]
2014-12-15 23:39           ` Bart Schaefer
2014-12-16 20:58             ` Peter Stephenson
2014-12-17 17:18             ` Jonathan H
2014-12-18  6:14               ` Bart Schaefer
2014-12-18 19:09                 ` Peter Stephenson
2014-12-18 19:34                   ` Peter Stephenson
2014-12-29  0:57                   ` Daniel Shahaf

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAAW2-Zft+xzCfSYF4O9F5TnaYqODdr8P_ZisPTPHQK8qyeGuVw@mail.gmail.com \
    --to=pythonnut@gmail.com \
    --cc=p.w.stephenson@ntlworld.com \
    --cc=zsh-workers@zsh.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/zsh/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).